An issue in onethink v.1.1 allows a remote attacker to execute arbitrary code via a crafted script to the AddonsController.class.php component.
References
| Link | Resource |
|---|---|
| https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 | Exploit Third Party Advisory |
| https://github.com/liu21st/onethink/issues/40 | Exploit Issue Tracking Third Party Advisory |
| https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 | Exploit Third Party Advisory |
| https://github.com/liu21st/onethink/issues/40 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-04-29 18:15
Updated : 2025-04-16 18:44
NVD link : CVE-2024-33443
Mitre link : CVE-2024-33443
CVE.ORG link : CVE-2024-33443
JSON object : View
Products Affected
onethink
- onethink
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
