CVE-2025-15421

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary SQL commands via the ID parameter in the /worksheet/agent_worksadd.jsp endpoint of Yonyou KSOA 9.0. This can lead to unauthorized data access, modification, or deletion. Organizations running Yonyou KSOA 9.0 with the vulnerable component exposed are affected.

💻 Affected Systems

Products:
  • Yonyou Space-Time Enterprise Information Integration KSOA Platform
Versions: 9.0
Operating Systems: Unknown - likely Windows-based given vendor's typical deployment
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation where the /worksheet/agent_worksadd.jsp endpoint is accessible. No special configuration is required for exploitation.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data exfiltration, modification, or deletion; potential for lateral movement to other systems; possible system takeover if database privileges allow command execution.

🟠

Likely Case

Unauthorized access to sensitive business data stored in the database, including customer information, financial records, or proprietary data.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation preventing exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely via HTTP GET requests, making internet-facing instances particularly vulnerable to automated attacks.
🏢 Internal Only: MEDIUM - Internal systems are still at risk from insider threats or compromised internal systems, though exposure is reduced compared to internet-facing instances.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and requires minimal technical skill to execute. No authentication is required to access the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Monitor vendor channels for updates. Consider upgrading to a newer version if available.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the /worksheet/agent_worksadd.jsp endpoint and ID parameter

Network Access Control

all

Restrict access to the vulnerable endpoint using network segmentation or access control lists

🧯 If You Can't Patch

  • Implement input validation and parameterized queries in the application code
  • Deploy a web application firewall with SQL injection detection rules

🔍 How to Verify

Check if Vulnerable:

Test the /worksheet/agent_worksadd.jsp endpoint with SQL injection payloads in the ID parameter (e.g., ID=1' OR '1'='1)

Check Version:

Check application version through admin interface or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and that proper input validation is implemented

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple requests to /worksheet/agent_worksadd.jsp with suspicious ID parameter values
  • Database query errors containing SQL syntax

Network Indicators:

  • HTTP GET requests to /worksheet/agent_worksadd.jsp containing SQL keywords in parameters
  • Unusual database connection patterns from application server

SIEM Query:

source="web_logs" AND uri="/worksheet/agent_worksadd.jsp" AND (param="ID" AND value CONTAINS "'" OR value CONTAINS "OR" OR value CONTAINS "UNION" OR value CONTAINS "SELECT")

🔗 References

📤 Share & Export