CVE-2024-24256

SQL Injection vulnerability in Yonyou space-time enterprise information integration platform v.9.0 and before allows an attacker to obtain sensitive information via the gwbhAIM parameter in the saveMove.jsp in the hr_position directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yonyou:yonyou:*:*:*:*:*:*:*:*

History

18 Sep 2025, 16:21

Type Values Removed Values Added
First Time Yonyou
Yonyou yonyou
CPE cpe:2.3:a:yonyou:yonyou:*:*:*:*:*:*:*:*
References () https://github.com/l8l1/killl.github.io/blob/main/3.md - () https://github.com/l8l1/killl.github.io/blob/main/3.md - Third Party Advisory

25 Nov 2024, 18:15

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

21 Nov 2024, 08:59

Type Values Removed Values Added
References () https://github.com/l8l1/killl.github.io/blob/main/3.md - () https://github.com/l8l1/killl.github.io/blob/main/3.md -
Summary
  • (es) Una vulnerabilidad de inyección SQL en la plataforma de integración de información empresarial espacio-temporal de Yonyou v.9.0 y anteriores permite a un atacante obtener información confidencial a través del parámetro gwbhAIM en saveMove.jsp en el directorio hr_position.

15 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-15 08:15

Updated : 2025-09-18 16:21


NVD link : CVE-2024-24256

Mitre link : CVE-2024-24256

CVE.ORG link : CVE-2024-24256


JSON object : View

Products Affected

yonyou

  • yonyou
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')