{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "13cce4d4fbd4ed5a03d85426ed0be95917d1625d"
            }
          ],
          "repo": "https://github.com/jishenghua/jsherp",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.",
  "id": "CVE-2024-24002",
  "modified": "2025-11-19T17:34:57.720264246Z",
  "published": "2024-02-07T00:15:56.503Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24002.txt"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/jishenghua/jshERP/issues/99"
    },
    {
      "type": "EVIDENCE",
      "url": "https://github.com/jishenghua/jshERP/issues/99"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}