<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>OA 1.0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/oa-1.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 23:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/oa-1.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)</title><link>https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</link><pubDate>Sat, 02 May 2026 23:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</guid><description>Jinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7670, affects Jinher OA 1.0, a web-based office automation software. The vulnerability resides within the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, specifically in how the application handles the &lsquo;DeptIDList&rsquo; argument. An unauthenticated remote attacker can manipulate this argument to inject malicious SQL code into database queries. The vulnerability was reported to the vendor; however, there has been no response, and an exploit is publicly available. This lack of response and the availability of an exploit increases the risk to organizations using the affected Jinher OA 1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Jinher OA 1.0 instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> endpoint.</li>
<li>The request includes a modified <code>DeptIDList</code> parameter containing SQL injection payloads.</li>
<li>The server-side application fails to properly sanitize or validate the <code>DeptIDList</code> input.</li>
<li>The unsanitized input is passed directly into a SQL query executed against the underlying database.</li>
<li>The injected SQL code is executed by the database server, potentially allowing the attacker to bypass authentication, extract sensitive data, or modify data.</li>
<li>The attacker retrieves sensitive information, such as user credentials, internal configurations, or financial data, depending on the database structure and injected SQL commands.</li>
<li>The attacker leverages compromised data to gain further access, escalate privileges, or conduct lateral movement within the organization&rsquo;s network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7670) can lead to unauthorized access to sensitive data, including user credentials, financial records, and internal communications. An attacker could potentially gain complete control over the affected Jinher OA 1.0 system and the underlying database. This could result in significant data breaches, financial losses, reputational damage, and disruption of business operations. Given the lack of vendor response, organizations using Jinher OA 1.0 are particularly vulnerable and should take immediate action to mitigate this risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests to <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> containing suspicious characters or SQL keywords within the <code>DeptIDList</code> parameter, as covered by the Sigma rule &ldquo;Detect Jinher OA SQL Injection Attempt via DeptIDList&rdquo;.</li>
<li>Apply input validation and sanitization to all user-supplied data, especially the <code>DeptIDList</code> parameter in <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code>, to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Generic SQL Injection Attempt&rdquo; to identify broader SQL injection attempts across your web applications.</li>
<li>Given the vendor&rsquo;s lack of response, consider isolating the affected Jinher OA 1.0 instance from the network or replacing it with a more secure alternative.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>cve-2026-7670</category><category>web-application</category></item></channel></rss>