SQL Injection vulnerability in Yonyou space-time enterprise information integration platform v.9.0 and before allows an attacker to obtain sensitive information via the gwbhAIM parameter in the saveMove.jsp in the hr_position directory.
References
| Link | Resource |
|---|---|
| https://github.com/l8l1/killl.github.io/blob/main/3.md | Third Party Advisory |
| https://github.com/l8l1/killl.github.io/blob/main/3.md | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-15 08:15
Updated : 2025-09-18 16:21
NVD link : CVE-2024-24256
Mitre link : CVE-2024-24256
CVE.ORG link : CVE-2024-24256
JSON object : View
Products Affected
yonyou
- yonyou
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
