SQL Injection vulnerability in Yonyou space-time enterprise information integration platform v.9.0 and before allows an attacker to obtain sensitive information via the gwbhAIM parameter in the saveMove.jsp in the hr_position directory.
References
| Link | Resource |
|---|---|
| https://github.com/l8l1/killl.github.io/blob/main/3.md | Third Party Advisory |
| https://github.com/l8l1/killl.github.io/blob/main/3.md | Third Party Advisory |
Configurations
History
18 Sep 2025, 16:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/l8l1/killl.github.io/blob/main/3.md - Third Party Advisory | |
| First Time |
Yonyou
Yonyou yonyou |
|
| CPE | cpe:2.3:a:yonyou:yonyou:*:*:*:*:*:*:*:* |
Information
Published : 2024-02-15 08:15
Updated : 2025-09-18 16:21
NVD link : CVE-2024-24256
Mitre link : CVE-2024-24256
CVE.ORG link : CVE-2024-24256
JSON object : View
Products Affected
yonyou
- yonyou
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
