Description
A security vulnerability has been detected in jishenghua jshERP up to 3.6. The impacted element is the function getBillItemByParam of the file /jshERP-boot/depotItem/importItemExcel of the component com.jsh.erp.datasource.mappers.DepotItemMapperEx. The manipulation of the argument barCodes leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
3.1
3.2
3.3
3.4
3.5
3.6
Timeline
| 2026-01-28: | Advisory disclosed |
| 2026-01-28: | VulDB entry created |
| 2026-02-09: | VulDB entry last update |
Credits
mukyuuhate (VulDB User)
References
github.com/jishenghua/jshERP/issues/145
github.com/jishenghua/jshERP/issues/145
vuldb.com/?id.343230 (VDB-343230 | jishenghua jshERP com.jsh.erp.datasource.mappers.DepotItemMapperEx importItemExcel getBillItemByParam sql injection)
vuldb.com/?ctiid.343230 (VDB-343230 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.739688 (Submit #739688 | https://github.com/jishenghua/jshERP jshERP v3.6 SQL Injection)
github.com/jishenghua/jshERP/issues/145
github.com/jishenghua/jshERP/issues/145
github.com/jishenghua/jshERP/