A vulnerability was found in SourceCodester Simple E-Learning System 1.0. It has been rated as critical. This issue affects some unknown processing of the file classRoom.php. The manipulation of the argument classCode with the input 1'||(SELECT 0x6770715a WHERE 8795=8795 AND (SELECT 8342 FROM(SELECT COUNT(*),CONCAT(0x7171786b71,(SELECT (ELT(8342=8342,1))),0x717a7a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md | Exploit Third Party Advisory |
https://vuldb.com/?id.204551 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-07-20 12:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-2489
Mitre link : CVE-2022-2489
CVE.ORG link : CVE-2022-2489
JSON object : View
Products Affected
simple_e-learning_system_project
- simple_e-learning_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')