Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13979: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Hangzhou Shengqiao Technology Co. Ltd. St. Joe ERP System ("圣乔ERP系统")

0
Critical
VulnerabilityCVE-2024-13979cvecve-2024-13979cwe-89
Published: Wed Aug 27 2025 (08/27/2025, 21:27:15 UTC)
Source: CVE Database V5
Vendor/Project: Hangzhou Shengqiao Technology Co. Ltd.
Product: St. Joe ERP System ("圣乔ERP系统")

Description

A SQL injection vulnerability exists in the St. Joe ERP system ("圣乔ERP系统") that allows unauthenticated remote attackers to execute arbitrary SQL commands via crafted HTTP POST requests to the login endpoint. The application fails to properly sanitize user-supplied input before incorporating it into SQL queries, enabling direct manipulation of the backend database. Successful exploitation may result in unauthorized data access, modification of records, or limited disruption of service. An affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-04-14 UTC.

AI-Powered Analysis

AILast updated: 11/28/2025, 22:50:08 UTC

Technical Analysis

CVE-2024-13979 identifies a critical SQL injection vulnerability in the St. Joe ERP system (圣乔ERP系统) developed by Hangzhou Shengqiao Technology Co. Ltd. The flaw exists in the login endpoint, where the application fails to properly sanitize user-supplied input before embedding it into SQL queries. This improper neutralization of special elements (CWE-89) allows unauthenticated remote attackers to craft malicious HTTP POST requests that manipulate the backend database directly. The vulnerability affects all versions of the product, with no specific version range defined. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Exploitation can lead to unauthorized data disclosure, unauthorized modification of records, and potential disruption of ERP services. The Shadowserver Foundation first observed exploitation attempts in April 2025, though no confirmed widespread exploitation is reported. The lack of available patches increases the urgency for defensive measures. Given the ERP system's role in managing enterprise resources, this vulnerability poses a severe risk to business operations and data security.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. ERP systems like St. Joe are critical for managing business processes, including inventory, finance, and supply chain operations. Successful exploitation could lead to unauthorized access to sensitive corporate data, including financial records, customer information, and intellectual property. Data integrity could be compromised by unauthorized modifications, potentially causing operational disruptions or financial inaccuracies. Availability may also be affected if attackers manipulate database records or cause service interruptions. Industries with high reliance on ERP systems, such as manufacturing, logistics, and retail, are particularly vulnerable. The risk extends to regulatory compliance, as data breaches involving personal or financial data could trigger GDPR violations, resulting in legal and financial penalties. The vulnerability's ease of exploitation without authentication amplifies the threat, making it accessible to a wide range of attackers, including opportunistic cybercriminals and advanced persistent threat actors targeting European enterprises.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the login endpoint. Network segmentation should isolate ERP systems from less trusted networks, limiting exposure. Conduct thorough input validation and sanitization on all user inputs at the application layer, ideally by applying parameterized queries or prepared statements if source code access is available. Monitor logs for unusual login attempts or anomalous SQL query patterns indicative of exploitation attempts. Employ intrusion detection systems (IDS) tuned for SQL injection signatures. Restrict access to the ERP system to trusted IP ranges where feasible, and enforce multi-factor authentication on all administrative interfaces to reduce risk from lateral movement post-exploitation. Regularly back up ERP databases and verify backup integrity to enable recovery from potential data tampering. Engage with the vendor for updates and patches, and consider alternative ERP solutions if remediation is delayed. Finally, conduct security awareness training for IT staff to recognize and respond to exploitation indicators promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-08-25T18:09:18.820Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692a23934c03a75d3feb2747

Added to database: 11/28/2025, 10:34:59 PM

Last enriched: 11/28/2025, 10:50:08 PM

Last updated: 12/5/2025, 1:52:27 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats