CVE-2023-38880

The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of "opensisBackup<date>.sql" (e.g. "opensisBackup07-20-2023.sql"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes.
Configurations

Configuration 1 (hide)

cpe:2.3:a:os4ed:opensis:9.0:*:*:*:community:*:*:*

History

21 Nov 2024, 08:14

Type Values Removed Values Added
References () https://github.com/OS4ED/openSIS-Classic - Product () https://github.com/OS4ED/openSIS-Classic - Product
References () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38880 - Third Party Advisory () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38880 - Third Party Advisory
References () https://www.os4ed.com/ - Product () https://www.os4ed.com/ - Product

30 Nov 2023, 02:21

Type Values Removed Values Added
References () https://www.os4ed.com/ - () https://www.os4ed.com/ - Product
References () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38880 - () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38880 - Third Party Advisory
References () https://github.com/OS4ED/openSIS-Classic - () https://github.com/OS4ED/openSIS-Classic - Product
CWE NVD-CWE-Other
CPE cpe:2.3:a:os4ed:opensis:9.0:*:*:*:community:*:*:*
First Time Os4ed opensis
Os4ed
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

29 Nov 2023, 23:15

Type Values Removed Values Added
Summary The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of "opensisBackup<date>.sq|" (e.g. "opensisBackup07-20-2023.sql"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes. The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of "opensisBackup<date>.sql" (e.g. "opensisBackup07-20-2023.sql"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes.

20 Nov 2023, 19:18

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-20 19:15

Updated : 2024-11-21 08:14


NVD link : CVE-2023-38880

Mitre link : CVE-2023-38880

CVE.ORG link : CVE-2023-38880


JSON object : View

Products Affected

os4ed

  • opensis