An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheckOthers.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 | Exploit Technical Description Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073 - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2020-09-01 15:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6124
Mitre link : CVE-2020-6124
CVE.ORG link : CVE-2020-6124
JSON object : View
Products Affected
os4ed
- opensis
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')