{ "id": "CVE-2024-24002", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T00:15:56.503", "lastModified": "2024-02-07T01:11:27.753", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection." } ], "metrics": {}, "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24002.txt", "source": "cve@mitre.org" }, { "url": "https://github.com/jishenghua/jshERP/issues/99", "source": "cve@mitre.org" } ] }