CVE-2024-24002: n/a
jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.
AI Analysis
Technical Summary
CVE-2024-24002 identifies a critical SQL Injection vulnerability in the jshERP version 3.3 software, specifically within the MaterialController's getListWithStock() function. This function accepts 'column' and 'order' parameters that are intended to control SQL query sorting but are insufficiently sanitized. The vulnerability stems from a flawed implementation of the safeSqlParse method, which fails to adequately filter or validate these parameters, allowing attackers to inject malicious SQL payloads. Such injection can manipulate backend database queries, potentially enabling unauthorized data access, data modification, or deletion. The vulnerability requires no privileges or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector of network and low attack complexity. No patches or official fixes are currently listed, and no public exploits are known yet, but the risk remains critical due to the nature of SQL Injection attacks. This vulnerability is categorized under CWE-89, a common and dangerous injection flaw. Organizations using jshERP for enterprise resource planning should urgently assess exposure and implement mitigations to prevent exploitation.
Potential Impact
The impact of CVE-2024-24002 is severe, as successful exploitation allows attackers to execute arbitrary SQL commands on the backend database without authentication. This can lead to unauthorized disclosure of sensitive business data, modification or deletion of critical records, and potentially full system compromise if the database server is leveraged to execute further commands. The integrity of business operations relying on jshERP could be severely disrupted, causing financial loss, reputational damage, and regulatory compliance violations. Availability may also be affected if attackers delete or corrupt essential data. Given the network-exploitable nature and lack of required privileges, the vulnerability poses a significant threat to any organization using the affected software version, especially those handling sensitive inventory, financial, or operational data.
Mitigation Recommendations
To mitigate CVE-2024-24002, organizations should immediately implement the following measures: 1) Apply any available patches or updates from the jshERP vendor once released. 2) If patches are unavailable, restrict access to the vulnerable MaterialController endpoints via network segmentation or firewall rules to limit exposure. 3) Implement strict input validation and sanitization on the 'column' and 'order' parameters at the application level, employing whitelisting of acceptable values rather than blacklisting. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting these parameters. 5) Conduct thorough code reviews and security testing of ERP modules to identify and remediate similar injection flaws. 6) Monitor database logs and application logs for anomalous queries or error messages indicative of injection attempts. 7) Educate development teams on secure coding practices, particularly regarding dynamic SQL query construction. These targeted actions go beyond generic advice and address the root cause and attack vector of this specific vulnerability.
Affected Countries
China, India, United States, Germany, United Kingdom, France, Brazil, Russia, Japan, South Korea
CVE-2024-24002: n/a
Description
jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-24002 identifies a critical SQL Injection vulnerability in the jshERP version 3.3 software, specifically within the MaterialController's getListWithStock() function. This function accepts 'column' and 'order' parameters that are intended to control SQL query sorting but are insufficiently sanitized. The vulnerability stems from a flawed implementation of the safeSqlParse method, which fails to adequately filter or validate these parameters, allowing attackers to inject malicious SQL payloads. Such injection can manipulate backend database queries, potentially enabling unauthorized data access, data modification, or deletion. The vulnerability requires no privileges or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector of network and low attack complexity. No patches or official fixes are currently listed, and no public exploits are known yet, but the risk remains critical due to the nature of SQL Injection attacks. This vulnerability is categorized under CWE-89, a common and dangerous injection flaw. Organizations using jshERP for enterprise resource planning should urgently assess exposure and implement mitigations to prevent exploitation.
Potential Impact
The impact of CVE-2024-24002 is severe, as successful exploitation allows attackers to execute arbitrary SQL commands on the backend database without authentication. This can lead to unauthorized disclosure of sensitive business data, modification or deletion of critical records, and potentially full system compromise if the database server is leveraged to execute further commands. The integrity of business operations relying on jshERP could be severely disrupted, causing financial loss, reputational damage, and regulatory compliance violations. Availability may also be affected if attackers delete or corrupt essential data. Given the network-exploitable nature and lack of required privileges, the vulnerability poses a significant threat to any organization using the affected software version, especially those handling sensitive inventory, financial, or operational data.
Mitigation Recommendations
To mitigate CVE-2024-24002, organizations should immediately implement the following measures: 1) Apply any available patches or updates from the jshERP vendor once released. 2) If patches are unavailable, restrict access to the vulnerable MaterialController endpoints via network segmentation or firewall rules to limit exposure. 3) Implement strict input validation and sanitization on the 'column' and 'order' parameters at the application level, employing whitelisting of acceptable values rather than blacklisting. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting these parameters. 5) Conduct thorough code reviews and security testing of ERP modules to identify and remediate similar injection flaws. 6) Monitor database logs and application logs for anomalous queries or error messages indicative of injection attempts. 7) Educate development teams on secure coding practices, particularly regarding dynamic SQL query construction. These targeted actions go beyond generic advice and address the root cause and attack vector of this specific vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-25T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d54b7ef31ef0b570614
Added to database: 2/25/2026, 9:44:52 PM
Last enriched: 2/26/2026, 10:18:41 AM
Last updated: 4/12/2026, 5:50:53 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.