CVE-2024-7896

A vulnerability was found in Tosei Online Store Management System ??????????? 4.02/4.03/4.04. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cgi-bin/p1_ftpserver.php. The manipulation of the argument adr_txt leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.4:*:*:*:*:*:*:*

History

27 Sep 2024, 01:16

Type Values Removed Values Added
CPE cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.3:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Tosei-corporation
Tosei-corporation online Store Management System
References () https://vuldb.com/?ctiid.274904 - () https://vuldb.com/?ctiid.274904 - Permissions Required
References () https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295 - () https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295 - Broken Link
References () https://vuldb.com/?id.274904 - () https://vuldb.com/?id.274904 - Third Party Advisory
References () https://vuldb.com/?submit.387131 - () https://vuldb.com/?submit.387131 - Third Party Advisory

17 Aug 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 14:15

Updated : 2024-09-27 01:16


NVD link : CVE-2024-7896

Mitre link : CVE-2024-7896


JSON object : View

Products Affected

tosei-corporation

  • online_store_management_system
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')