Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24002: n/a

0
Critical
VulnerabilityCVE-2024-24002cvecve-2024-24002
Published: Tue Feb 06 2024 (02/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:18:41 UTC

Technical Analysis

CVE-2024-24002 identifies a critical SQL Injection vulnerability in the jshERP version 3.3 software, specifically within the MaterialController's getListWithStock() function. This function accepts 'column' and 'order' parameters that are intended to control SQL query sorting but are insufficiently sanitized. The vulnerability stems from a flawed implementation of the safeSqlParse method, which fails to adequately filter or validate these parameters, allowing attackers to inject malicious SQL payloads. Such injection can manipulate backend database queries, potentially enabling unauthorized data access, data modification, or deletion. The vulnerability requires no privileges or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector of network and low attack complexity. No patches or official fixes are currently listed, and no public exploits are known yet, but the risk remains critical due to the nature of SQL Injection attacks. This vulnerability is categorized under CWE-89, a common and dangerous injection flaw. Organizations using jshERP for enterprise resource planning should urgently assess exposure and implement mitigations to prevent exploitation.

Potential Impact

The impact of CVE-2024-24002 is severe, as successful exploitation allows attackers to execute arbitrary SQL commands on the backend database without authentication. This can lead to unauthorized disclosure of sensitive business data, modification or deletion of critical records, and potentially full system compromise if the database server is leveraged to execute further commands. The integrity of business operations relying on jshERP could be severely disrupted, causing financial loss, reputational damage, and regulatory compliance violations. Availability may also be affected if attackers delete or corrupt essential data. Given the network-exploitable nature and lack of required privileges, the vulnerability poses a significant threat to any organization using the affected software version, especially those handling sensitive inventory, financial, or operational data.

Mitigation Recommendations

To mitigate CVE-2024-24002, organizations should immediately implement the following measures: 1) Apply any available patches or updates from the jshERP vendor once released. 2) If patches are unavailable, restrict access to the vulnerable MaterialController endpoints via network segmentation or firewall rules to limit exposure. 3) Implement strict input validation and sanitization on the 'column' and 'order' parameters at the application level, employing whitelisting of acceptable values rather than blacklisting. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting these parameters. 5) Conduct thorough code reviews and security testing of ERP modules to identify and remediate similar injection flaws. 6) Monitor database logs and application logs for anomalous queries or error messages indicative of injection attempts. 7) Educate development teams on secure coding practices, particularly regarding dynamic SQL query construction. These targeted actions go beyond generic advice and address the root cause and attack vector of this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d54b7ef31ef0b570614

Added to database: 2/25/2026, 9:44:52 PM

Last enriched: 2/26/2026, 10:18:41 AM

Last updated: 4/12/2026, 5:50:53 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses