| 标题 | Yonyou KSOA V9.0 SQL Injection |
|---|
| 描述 | During the security assessment of KSOA, I discovered a critical SQL injection vulnerability in the "/worksheet/agent_work_report.jsp" file. The vulnerability exists because the application fails to properly sanitize the 'id' parameter before using it in a SQL statement. Remote attackers can exploit this by injecting malicious SQL commands (e.g., WAITFOR DELAY) to delay the response, confirming the injection and allowing for data exfiltration via blind SQL injection techniques. |
|---|
| 来源 | ⚠️ https://github.com/master-abc/cve/issues/3 |
|---|
| 用户 | jiefengliang (UID 93721) |
|---|
| 提交 | 2025-12-22 18時16分 (3 月前) |
|---|
| 管理 | 2026-01-01 19時21分 (10 days later) |
|---|
| 状态 | 重复 |
|---|
| VulDB条目 | 339342 [Yonyou KSOA 9.0 agent_work_report.jsp 标识符 SQL注入] |
|---|
| 积分 | 0 |
|---|