| Titre | Yonyou KSOA V9.0 SQL Injection |
|---|
| Description | During the security assessment of KSOA, I discovered a critical SQL injection vulnerability in the "/worksheet/agent_work_report.jsp" file. The vulnerability exists because the application fails to properly sanitize the 'id' parameter before using it in a SQL statement. Remote attackers can exploit this by injecting malicious SQL commands (e.g., WAITFOR DELAY) to delay the response, confirming the injection and allowing for data exfiltration via blind SQL injection techniques. |
|---|
| La source | ⚠️ https://github.com/master-abc/cve/issues/3 |
|---|
| Utilisateur | jiefengliang (UID 93721) |
|---|
| Soumission | 22/12/2025 18:16 (il y a 3 mois) |
|---|
| Modérer | 01/01/2026 19:21 (10 days later) |
|---|
| Statut | Dupliqué |
|---|
| Entrée VulDB | 339342 [Yonyou KSOA 9.0 agent_work_report.jsp ID injection SQL] |
|---|
| Points | 0 |
|---|