TenderDocTransfer from Chunghwa Telecom has a Reflected Cross-site scripting vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use specific APIs through phishing to execute arbitrary JavaScript code in the user’s browser. Since the web server set by the application supports Node.Js features, attackers can further leverage this to run OS commands.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Dec 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cht
Cht tenderdoctransfer |
|
| CPEs | cpe:2.3:a:cht:tenderdoctransfer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cht
Cht tenderdoctransfer |
Mon, 16 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Dec 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TenderDocTransfer from Chunghwa Telecom has a Reflected Cross-site scripting vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use specific APIs through phishing to execute arbitrary JavaScript code in the user’s browser. Since the web server set by the application supports Node.Js features, attackers can further leverage this to run OS commands. | |
| Title | Chunghwa Telecom TenderDocTransfer - Reflected Cross-site Scripting to RCE | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-12-16T16:44:08.298Z
Reserved: 2024-12-16T01:39:20.993Z
Link: CVE-2024-12641
Updated: 2024-12-16T16:44:04.254Z
Status : Analyzed
Published: 2024-12-16T07:15:05.787
Modified: 2025-12-23T19:54:52.000
Link: CVE-2024-12641
No data.
OpenCVE Enrichment
No data.