Skip to main content

CVE-2024-24003: n/a in n/a

Critical
VulnerabilityCVE-2024-24003cvecve-2024-24003
Published: Thu Feb 08 2024 (02/08/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutMaterialCount() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:55:34 UTC

Technical Analysis

CVE-2024-24003 is a critical SQL Injection vulnerability identified in jshERP version 3.3, specifically within the function findInOutMaterialCount() of the DepotHeadController component. The vulnerability arises because the parameters `column` and `order` are insufficiently sanitized before being used in SQL queries. The application employs a protection mechanism called `safeSqlParse` intended to prevent SQL injection, but this mechanism can be bypassed by a crafted malicious payload. As a result, an attacker can inject arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or complete compromise of the underlying database. The vulnerability has a CVSS v3.1 score of 9.8, reflecting its critical severity, with an attack vector of network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is classified under CWE-89, which corresponds to SQL Injection flaws. Given the nature of ERP systems, which typically manage sensitive business data such as inventory, financials, and personnel information, exploitation could lead to severe operational disruption and data breaches.

Potential Impact

For European organizations using jshERP v3.3, this vulnerability poses a significant risk. Successful exploitation could allow attackers to exfiltrate sensitive corporate data, manipulate inventory or financial records, or disrupt business operations by corrupting or deleting critical data. This could lead to financial losses, regulatory non-compliance (e.g., GDPR violations due to data breaches), reputational damage, and operational downtime. Since ERP systems are often integrated with other business-critical systems, the compromise could cascade, affecting supply chain management, procurement, and customer relations. The lack of required privileges and user interaction means attackers can exploit this remotely and autonomously, increasing the threat level. European organizations in sectors such as manufacturing, retail, and logistics that rely on jshERP for resource planning and inventory management are particularly vulnerable. Additionally, the criticality of the vulnerability means that threat actors may prioritize developing exploits once details become widely known, increasing the urgency for mitigation.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately implement compensating controls. First, restrict network access to the jshERP application, limiting it to trusted internal IP addresses and VPN users only. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the `column` and `order` parameters. Conduct thorough input validation and sanitization on these parameters at the application level, ensuring only expected values (e.g., whitelisted column names and order directions) are accepted. Monitor application logs for anomalous query patterns or repeated failed attempts indicative of injection attempts. Organizations should also prepare for rapid patch deployment once an official fix is released by the vendor or community. Additionally, conduct security awareness training for developers and administrators on secure coding practices and the risks of SQL injection. Finally, consider isolating the ERP database with strict access controls and regular backups to enable recovery in case of data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd81a0

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:55:34 AM

Last updated: 8/4/2025, 2:18:59 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats