Skip to main content

CVE-2023-6655: CWE-89 SQL Injection in Hongjing e-HR

High
VulnerabilityCVE-2023-6655cvecve-2023-6655cwe-89
Published: Sun Dec 10 2023 (12/10/2023, 15:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Hongjing
Product: e-HR

Description

A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/06/2025, 04:10:33 UTC

Technical Analysis

CVE-2023-6655 is a critical SQL Injection vulnerability identified in the Hongjing e-HR 2020 product, specifically affecting an unknown functionality within the Login Interface component. The vulnerability resides in the handling of the 'parentid' argument in the file path /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree. Due to improper input validation and sanitization, an attacker can manipulate the 'parentid' parameter to inject malicious SQL code. This flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability is classified under CWE-89 (SQL Injection), which is a common and dangerous injection flaw that can compromise the confidentiality, integrity, and availability of the affected system's data. The CVSS v3.1 base score is 7.3 (High), reflecting the ease of exploitation (network vector, no privileges, no user interaction) and the potential impact (partial loss of confidentiality, integrity, and availability). Although no public exploits have been observed in the wild yet, the exploit details have been disclosed, increasing the risk of exploitation by threat actors. The vulnerability affects the 2020 version of Hongjing e-HR, an enterprise human resource management system, which likely manages sensitive employee and organizational data. The attack vector is remote, making it accessible to attackers over the internet or internal networks if the vulnerable interface is exposed. Given the nature of SQL Injection, successful exploitation could lead to unauthorized data access, data modification, deletion, or even full system compromise depending on the database permissions and backend architecture.

Potential Impact

For European organizations using Hongjing e-HR 2020, this vulnerability poses significant risks. The e-HR system typically contains sensitive personal data of employees, including identification, payroll, and organizational structure information, which are subject to strict data protection regulations such as GDPR. Exploitation could lead to unauthorized disclosure of personal data, resulting in privacy breaches and regulatory penalties. Integrity loss could disrupt HR operations, causing erroneous personnel records or payroll errors, impacting business continuity. Availability impact could result in denial of service to HR staff, delaying critical HR functions. Furthermore, if attackers leverage this vulnerability to pivot within the network, it could lead to broader compromise of enterprise systems. The remote and unauthenticated nature of the vulnerability increases the attack surface, especially if the affected interface is exposed to external networks. European organizations must consider the reputational damage and compliance risks associated with such breaches, alongside operational disruptions.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the vulnerable endpoint by network-level controls such as firewalls or VPNs to limit exposure only to trusted internal users. 2. Implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'parentid' parameter and the affected URL path. 3. Conduct thorough input validation and sanitization on the 'parentid' parameter to ensure only expected data formats are accepted, employing parameterized queries or prepared statements in the backend code to prevent injection. 4. Since no official patch is currently available, organizations should engage with Hongjing support for updates or consider temporary workarounds such as disabling the vulnerable functionality if feasible. 5. Monitor logs for suspicious activity related to the vulnerable endpoint, including unusual query patterns or error messages indicative of injection attempts. 6. Perform an internal audit to identify all instances of the vulnerable software version and prioritize remediation based on exposure and criticality. 7. Educate IT and security teams about this vulnerability to enhance detection and response capabilities. 8. Plan for a comprehensive patch deployment once an official fix is released by the vendor.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-12-09T20:52:34.328Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835d69f182aa0cae2176733

Added to database: 5/27/2025, 3:13:35 PM

Last enriched: 7/6/2025, 4:10:33 AM

Last updated: 8/2/2025, 12:27:32 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats