A vulnerability classified as critical has been found in SourceCodester Simple E-Learning System 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument classCode with the input 1'||(SELECT 0x74666264 WHERE 5610=5610 AND (SELECT 7504 FROM(SELECT COUNT(*),CONCAT(0x7171627a71,(SELECT (ELT(7504=7504,1))),0x71717a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php | Exploit Third Party Advisory |
https://vuldb.com/?id.204552 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-07-20 12:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-2490
Mitre link : CVE-2022-2490
CVE.ORG link : CVE-2022-2490
JSON object : View
Products Affected
simple_e-learning_system_project
- simple_e-learning_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')