Description
A flaw has been found in Chanjet TPlus up to 20251121. Affected by this vulnerability is an unknown functionality of the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load. This manipulation of the argument currentAccId causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2025-12-06: | Advisory disclosed |
| 2025-12-06: | VulDB entry created |
| 2025-12-06: | VulDB entry last update |
Credits
routing_love (VulDB User)
References
vuldb.com/?id.334610 (VDB-334610 | Chanjet TPlus sql injection)
vuldb.com/?ctiid.334610 (VDB-334610 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.699144 (Submit #699144 | Chanjet Chanjet T+ V1.0 SQL Injection)
github.com/hacker-routing/Changjetong-T-/issues/1
github.com/hacker-routing/Changjetong-T-/issues/1