A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the index.php USERNAME parameter. NOTE: this issue may exist because of an incomplete fix for CVE-2020-6637.
References
Link | Resource |
---|---|
https://github.com/5qu1n7/CVE-2021-40353 | Exploit Third Party Advisory |
https://www.opensis.com/download/english | Product |
https://github.com/5qu1n7/CVE-2021-40353 | Exploit Third Party Advisory |
https://www.opensis.com/download/english | Product |
Configurations
History
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/5qu1n7/CVE-2021-40353 - Exploit, Third Party Advisory | |
References | () https://www.opensis.com/download/english - Product |
Information
Published : 2021-09-01 01:15
Updated : 2024-11-21 06:23
NVD link : CVE-2021-40353
Mitre link : CVE-2021-40353
CVE.ORG link : CVE-2021-40353
JSON object : View
Products Affected
os4ed
- opensis
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')