CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8568

Critical Severity
SVRS
84/100

CVSSv3
9.8/10

EPSS
0.00025/1

CVE-2024-8568 is a critical SQL injection vulnerability in Mini-Tmall up to version 20240901, specifically affecting the rewardMapper.select function. This flaw allows remote attackers to execute arbitrary SQL commands by manipulating the orderBy argument in the tmall/admin/order/1/1 file. Given its high SOCRadar Vulnerability Risk Score (SVRS) of 84, this vulnerability is considered critical and requires immediate attention. The public availability of the exploit further amplifies the risk of active exploitation. Due to the vendor's lack of response, patching may not be available, increasing the urgency to implement mitigation strategies. The ability to inject SQL code can lead to data breaches, system compromise, and other severe consequences, making this a significant threat to Mini-Tmall installations.

No tags available
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-09-08

2024-09-16
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-8568 is a critical SQL injection vulnerability in Mini-Tmall up to 20240901. The vulnerability allows remote attackers to manipulate the orderBy argument in the rewardMapper.select function, leading to SQL injection. The exploit has been publicly disclosed and may be actively used.

Key Insights

  • High Severity: The SVRS of 67 indicates a high level of severity, highlighting the urgency of addressing this vulnerability.
  • Remote Exploitation: The vulnerability can be exploited remotely, increasing the risk of widespread attacks.
  • Public Disclosure: The exploit has been publicly disclosed, making it more likely that attackers will attempt to exploit it.
  • Vendor Unresponsive: The vendor has not responded to the disclosure, indicating a lack of commitment to addressing the vulnerability.

Mitigation Strategies

  • Apply Software Updates: Install the latest software updates from the vendor to patch the vulnerability.
  • Implement Input Validation: Validate user input to prevent malicious SQL queries from being executed.
  • Use a Web Application Firewall (WAF): Deploy a WAF to block malicious traffic and protect against SQL injection attacks.
  • Monitor for Suspicious Activity: Monitor network traffic and logs for any suspicious activity that may indicate an attack.

Additional Information

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: There is no evidence that this vulnerability is actively exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

CVE-2024-8568 A vulnerability, which was classified as critical, was found in Mini-Tmall up to 20240901. Affected is the function https://t.co/VVg4IMQ7Uc of the file tmall/admin/order/1/… https://t.co/SaeJs3i6sg
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://gitee.com/A0kooo/cve_article/blob/master/Mini-Tmall/Tmall_demo%20OrderController.java%20SQL%20Injection.md
[email protected]https://vuldb.com/?ctiid.276798
[email protected]https://vuldb.com/?id.276798
[email protected]https://vuldb.com/?submit.401010

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence