CVE-2020-6124

An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheckOthers.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 Exploit Technical Description Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:os4ed:opensis:7.3:*:*:*:*:*:*:*

History

21 Nov 2024, 05:35

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 - Exploit, Technical Description, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 - Exploit, Technical Description, Third Party Advisory

Information

Published : 2020-09-01 15:15

Updated : 2024-11-21 05:35


NVD link : CVE-2020-6124

Mitre link : CVE-2020-6124

CVE.ORG link : CVE-2020-6124


JSON object : View

Products Affected

os4ed

  • opensis
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')