CVE-2024-24003: n/a in n/a
jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutMaterialCount() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.
AI Analysis
Technical Summary
CVE-2024-24003 is a critical SQL Injection vulnerability identified in jshERP version 3.3, specifically within the function findInOutMaterialCount() of the DepotHeadController component. The vulnerability arises because the parameters `column` and `order` are insufficiently sanitized before being used in SQL queries. The application employs a protection mechanism called `safeSqlParse` intended to prevent SQL injection, but this mechanism can be bypassed by a crafted malicious payload. As a result, an attacker can inject arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or complete compromise of the underlying database. The vulnerability has a CVSS v3.1 score of 9.8, reflecting its critical severity, with an attack vector of network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is classified under CWE-89, which corresponds to SQL Injection flaws. Given the nature of ERP systems, which typically manage sensitive business data such as inventory, financials, and personnel information, exploitation could lead to severe operational disruption and data breaches.
Potential Impact
For European organizations using jshERP v3.3, this vulnerability poses a significant risk. Successful exploitation could allow attackers to exfiltrate sensitive corporate data, manipulate inventory or financial records, or disrupt business operations by corrupting or deleting critical data. This could lead to financial losses, regulatory non-compliance (e.g., GDPR violations due to data breaches), reputational damage, and operational downtime. Since ERP systems are often integrated with other business-critical systems, the compromise could cascade, affecting supply chain management, procurement, and customer relations. The lack of required privileges and user interaction means attackers can exploit this remotely and autonomously, increasing the threat level. European organizations in sectors such as manufacturing, retail, and logistics that rely on jshERP for resource planning and inventory management are particularly vulnerable. Additionally, the criticality of the vulnerability means that threat actors may prioritize developing exploits once details become widely known, increasing the urgency for mitigation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement compensating controls. First, restrict network access to the jshERP application, limiting it to trusted internal IP addresses and VPN users only. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the `column` and `order` parameters. Conduct thorough input validation and sanitization on these parameters at the application level, ensuring only expected values (e.g., whitelisted column names and order directions) are accepted. Monitor application logs for anomalous query patterns or repeated failed attempts indicative of injection attempts. Organizations should also prepare for rapid patch deployment once an official fix is released by the vendor or community. Additionally, conduct security awareness training for developers and administrators on secure coding practices and the risks of SQL injection. Finally, consider isolating the ERP database with strict access controls and regular backups to enable recovery in case of data compromise.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria, Czech Republic
CVE-2024-24003: n/a in n/a
Description
jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutMaterialCount() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.
AI-Powered Analysis
Technical Analysis
CVE-2024-24003 is a critical SQL Injection vulnerability identified in jshERP version 3.3, specifically within the function findInOutMaterialCount() of the DepotHeadController component. The vulnerability arises because the parameters `column` and `order` are insufficiently sanitized before being used in SQL queries. The application employs a protection mechanism called `safeSqlParse` intended to prevent SQL injection, but this mechanism can be bypassed by a crafted malicious payload. As a result, an attacker can inject arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or complete compromise of the underlying database. The vulnerability has a CVSS v3.1 score of 9.8, reflecting its critical severity, with an attack vector of network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is classified under CWE-89, which corresponds to SQL Injection flaws. Given the nature of ERP systems, which typically manage sensitive business data such as inventory, financials, and personnel information, exploitation could lead to severe operational disruption and data breaches.
Potential Impact
For European organizations using jshERP v3.3, this vulnerability poses a significant risk. Successful exploitation could allow attackers to exfiltrate sensitive corporate data, manipulate inventory or financial records, or disrupt business operations by corrupting or deleting critical data. This could lead to financial losses, regulatory non-compliance (e.g., GDPR violations due to data breaches), reputational damage, and operational downtime. Since ERP systems are often integrated with other business-critical systems, the compromise could cascade, affecting supply chain management, procurement, and customer relations. The lack of required privileges and user interaction means attackers can exploit this remotely and autonomously, increasing the threat level. European organizations in sectors such as manufacturing, retail, and logistics that rely on jshERP for resource planning and inventory management are particularly vulnerable. Additionally, the criticality of the vulnerability means that threat actors may prioritize developing exploits once details become widely known, increasing the urgency for mitigation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement compensating controls. First, restrict network access to the jshERP application, limiting it to trusted internal IP addresses and VPN users only. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the `column` and `order` parameters. Conduct thorough input validation and sanitization on these parameters at the application level, ensuring only expected values (e.g., whitelisted column names and order directions) are accepted. Monitor application logs for anomalous query patterns or repeated failed attempts indicative of injection attempts. Organizations should also prepare for rapid patch deployment once an official fix is released by the vendor or community. Additionally, conduct security awareness training for developers and administrators on secure coding practices and the risks of SQL injection. Finally, consider isolating the ERP database with strict access controls and regular backups to enable recovery in case of data compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd81a0
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 4:55:34 AM
Last updated: 8/4/2025, 2:18:59 AM
Views: 14
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.