Impact
The vulnerability resides in Yonyou KSOA 9.0, affecting an HTTP GET parameter handler in the folder.jsp file. An attacker can manipulate the folderid argument to inject a SQL statement, resulting in a classic SQL injection flaw that compromises confidentiality and integrity of the database and may allow unauthorized data retrieval or modification.
Affected Systems
The flaw affects Yonyou KSOA version 9.0. The affected component is the /kmf/folder.jsp file within the HTTP GET parameter handler of the KSOA application.
Risk and Exploitability
The entry has a CVSS score of 6.9, indicating moderate severity. An EPSS score below 1% and no listing in the CISA KEV catalog suggest that the likelihood of exploitation remains low at this time. The vulnerability is exploitable remotely via a crafted HTTP GET request, and can be publicly exploited if no mitigations are applied.
OpenCVE Enrichment