提交 #721531: Yonyou KSOA V9.0 SQL Injection信息

标题Yonyou KSOA V9.0 SQL Injection
描述During the security assessment of KSOA, I discovered a critical SQL injection vulnerability in the "/worksheet/agent_work_report.jsp" file. The vulnerability exists because the application fails to properly sanitize the 'id' parameter before using it in a SQL statement. Remote attackers can exploit this by injecting malicious SQL commands (e.g., WAITFOR DELAY) to delay the response, confirming the injection and allowing for data exfiltration via blind SQL injection techniques.
来源⚠️ https://github.com/master-abc/cve/issues/3
用户
 jiefengliang (UID 93721)
提交2025-12-22 18時16分 (3 月前)
管理2026-01-01 19時21分 (10 days later)
状态重复
VulDB条目339342 [Yonyou KSOA 9.0 agent_work_report.jsp 标识符 SQL注入]
积分0

Do you want to use VulDB in your project?

Use the official API to access entries easily!