Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rqmc-4j3g-x93f

Опубликовано: 20 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 7.3

Описание

A weakness has been identified in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /kmf/save_folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

A weakness has been identified in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /kmf/save_folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 9%
0.00033
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74
CWE-89

Связанные уязвимости

CVSS3: 7.3
nvd
19 дней назад

A weakness has been identified in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /kmf/save_folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 9%
0.00033
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74
CWE-89