A vulnerability in the vae_admin_rule database table of vaeThink v1.0.1 allows attackers to execute arbitrary code via a crafted payload in the condition parameter.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://github.com/tingyuu/vaeThink/issues/1 | third party advisory exploit |
https://cwe.mitre.org/data/definitions/94.html | third party advisory |