CVE-2026-1178

7.3 HIGH

📋 TL;DR

This is a SQL injection vulnerability in Yonyou KSOA 9.0 that allows remote attackers to execute arbitrary SQL commands via the 'folderid' parameter in the /kmf/select.jsp endpoint. The vulnerability affects organizations using Yonyou KSOA 9.0 with the vulnerable component exposed. Attackers can potentially access, modify, or delete database information.

💻 Affected Systems

Products:
  • Yonyou KSOA
Versions: 9.0
Operating Systems: All platforms running Yonyou KSOA
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of Yonyou KSOA 9.0 in the /kmf/select.jsp component

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining

🟠

Likely Case

Unauthorized database access allowing data exfiltration, privilege escalation, or application compromise

🟢

If Mitigated

Limited impact with proper input validation, WAF protection, and network segmentation in place

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP GET requests with public exploit available
🏢 Internal Only: HIGH - Even internally, the SQL injection can lead to significant data compromise if exploited

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub, making this easily weaponizable by attackers with basic skills

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the /kmf/select.jsp endpoint and folderid parameter

# Example ModSecurity rule: SecRule ARGS:folderid "@detectSQLi" "id:1001,phase:2,deny,status:403"

URL Rewrite/Blocking

all

Block access to the vulnerable endpoint using web server configuration or network filtering

# Apache: RewriteRule ^/kmf/select\.jsp$ - [F]
# Nginx: location ~ ^/kmf/select\.jsp$ { return 403; }
# IIS: Add request filtering rule for /kmf/select.jsp

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Yonyou KSOA systems only to authorized users
  • Deploy database monitoring and alerting for unusual SQL queries or access patterns

🔍 How to Verify

Check if Vulnerable:

Test the /kmf/select.jsp endpoint with SQL injection payloads in the folderid parameter (e.g., folderid=1' OR '1'='1)

Check Version:

Check Yonyou KSOA version through application interface or configuration files

Verify Fix Applied:

Verify that SQL injection attempts against /kmf/select.jsp are blocked or return error responses

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple requests to /kmf/select.jsp with special characters in parameters
  • Database error logs showing injection attempts

Network Indicators:

  • HTTP GET requests to /kmf/select.jsp containing SQL keywords (UNION, SELECT, INSERT, etc.) in parameters
  • Unusual database connection patterns from application servers

SIEM Query:

source="web_logs" AND uri_path="/kmf/select.jsp" AND (query_string="*folderid=*'*" OR query_string="*folderid=*%27*")

🔗 References

📤 Share & Export