Impact
A flaw in the folderid parameter of the /kmf/select.jsp page allows an attacker to inject arbitrary SQL text into ordinary HTTP GET requests. The injection can be used to read, alter, or delete data in the underlying database, leading to confidentiality or integrity compromise of business information. The weakness is reflected in CWE-74 and CWE-89, both describing improper neutralization of special elements in an SQL statement.
Affected Systems
Yonyou KSOA version 9.0 is affected. The vulnerability resides in the HTTP GET handler for /kmf/select.jsp, which is exposed by the KSOA web application. No other product versions are listed as impacted, and no patch information is currently available.
Risk and Exploitability
The CVSS score is 6.9, indicating a moderate to high severity. EPSS is below 1%, suggesting a low current probability of exploitation, and the vulnerability does not appear in the KEV catalog. The attack vector is remote, as it requires only a crafted URL sent over HTTP; no authentication or additional access privilege is necessary for exploitation.
OpenCVE Enrichment