提出 #721324: Yonyou KSOA V9.0 SQL Injection情報

タイトルYonyou KSOA V9.0 SQL Injection
説明A SQL injection vulnerability exists in the Yonyou Space-Time KSOA Platform v9.0. The vulnerability is located in the /worksheet/agent_worksadd.jsp file. The application accepts untrusted input via the id HTTP GET parameter and directly concatenates it into a backend SQL query without proper validation or parameterization. This allows an unauthenticated remote attacker to inject malicious SQL commands, leading to potential data leakage, unauthorized database access, or server manipulation. The backend database appears to be Microsoft SQL Server.
ソース⚠️ https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksadd.jsp%20SQL%20injection.md
ユーザー
 jiefengliang (UID 93721)
送信2025年12月22日 06:20 (4 月 ago)
モデレーション2026年01月01日 12:04 (10 days later)
ステータス承諾済み
VulDBエントリ339343 [Yonyou KSOA 9.0 HTTP GET Parameter agent_worksadd.jsp 識別子 SQLインジェクション]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!