Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24004: n/a

0
Critical
VulnerabilityCVE-2024-24004cvecve-2024-24004
Published: Tue Feb 06 2024 (02/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-24004 is a critical SQL Injection vulnerability in jshERP v3. 3, specifically in the DepotHeadController's findInOutDetail() function. The vulnerability arises because the application does not properly sanitize the 'column' and 'order' parameters, allowing attackers to bypass the safeSqlParse method and inject malicious SQL payloads. This flaw enables unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to full database compromise including data confidentiality, integrity, and availability. The vulnerability has a CVSS score of 9. 8, indicating critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the risk is high due to the ease of exploitation and the critical nature of the flaw. Organizations using jshERP v3. 3 should urgently review and patch this vulnerability once a fix is available, or implement immediate mitigations to restrict access and monitor for suspicious activity.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:18:53 UTC

Technical Analysis

CVE-2024-24004 identifies a critical SQL Injection vulnerability in the jshERP enterprise resource planning software, version 3.3. The vulnerability exists in the DepotHeadController component, specifically within the findInOutDetail() function. This function processes user-supplied 'column' and 'order' parameters that are intended to control SQL query sorting and filtering. However, these parameters are insufficiently sanitized, allowing attackers to craft malicious input that bypasses the application's safeSqlParse method designed to prevent SQL injection. As a result, attackers can inject arbitrary SQL commands directly into the backend database query. This vulnerability is exploitable remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. The impact includes unauthorized data disclosure, data modification, and potential denial of service by corrupting or deleting database contents. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The CVSS v3.1 base score is 9.8, reflecting the critical nature of this flaw with full impact on confidentiality, integrity, and availability, and an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). No patches or known exploits are currently reported, but the severity and ease of exploitation make this a high priority for remediation.

Potential Impact

The impact of CVE-2024-24004 on organizations using jshERP v3.3 is severe. Successful exploitation allows remote attackers to execute arbitrary SQL commands on the backend database without authentication, leading to full compromise of sensitive business data. This includes unauthorized access to confidential information such as financial records, inventory data, and operational details. Attackers could modify or delete critical data, disrupting business operations and causing data integrity issues. Additionally, attackers may leverage this access to escalate privileges within the system or pivot to other internal resources, increasing the overall risk. The availability of the ERP system could be compromised through destructive SQL commands, resulting in downtime and operational losses. Given the critical role ERP systems play in enterprise resource management, the vulnerability poses a significant threat to organizational security, compliance, and business continuity worldwide.

Mitigation Recommendations

To mitigate CVE-2024-24004, organizations should immediately restrict external access to the jshERP application, especially the vulnerable DepotHeadController endpoints, using network segmentation, firewalls, or VPNs. Implement strict input validation and sanitization on the 'column' and 'order' parameters at the application level to prevent malicious SQL payloads. Employ parameterized queries or prepared statements in the codebase to eliminate direct concatenation of user inputs into SQL commands. Monitor application logs and database activity for unusual queries or access patterns indicative of exploitation attempts. If possible, deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting these parameters. Organizations should engage with the jshERP vendor or community to obtain and apply official patches or updates addressing this vulnerability as soon as they become available. Additionally, conduct thorough security assessments and penetration testing on the ERP environment to identify and remediate any other potential injection points.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d56b7ef31ef0b57068e

Added to database: 2/25/2026, 9:44:54 PM

Last enriched: 2/26/2026, 10:18:53 AM

Last updated: 2/26/2026, 11:11:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats