CVE-2024-8784

A vulnerability classified as critical was found in QDocs Smart School Management System 7.0.0. Affected by this vulnerability is an unknown functionality of the file /user/chat/mynewuser of the component Chat. The manipulation of the argument users[] with the input 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM as part of POST Request Parameter leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.1 is able to address this issue. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qdocs:smart_school:7.0.0:*:*:*:*:*:*:*

History

19 Sep 2024, 01:38

Type Values Removed Values Added
References () https://codecanyon.net/item/smart-school-school-management-system/19426018 - () https://codecanyon.net/item/smart-school-school-management-system/19426018 - Product
References () https://github.com/bytium/vulnerability-research/blob/main/Advisory%20for%20Time-Based%20Blind%20SQL%20Injection%20in%20QDocs%20Smart%20School.md - () https://github.com/bytium/vulnerability-research/blob/main/Advisory%20for%20Time-Based%20Blind%20SQL%20Injection%20in%20QDocs%20Smart%20School.md - Third Party Advisory
References () https://smart-school.in/article/version-7-0-1 - () https://smart-school.in/article/version-7-0-1 - Release Notes
References () https://vuldb.com/?ctiid.277435 - () https://vuldb.com/?ctiid.277435 - Permissions Required
References () https://vuldb.com/?id.277435 - () https://vuldb.com/?id.277435 - Third Party Advisory
References () https://vuldb.com/?submit.407385 - () https://vuldb.com/?submit.407385 - Third Party Advisory
Summary
  • (es) Se encontró una vulnerabilidad clasificada como crítica en QDocs Smart School Management System 7.0.0. Esta vulnerabilidad afecta una funcionalidad desconocida del archivo /user/chat/mynewuser del componente Chat. La manipulación del argumento users[] con la entrada 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM como parte del parámetro de solicitud POST conduce a una inyección SQL. El ataque se puede lanzar de forma remota. El exploit se ha divulgado al público y puede utilizarse. La actualización a la versión 7.0.1 puede solucionar este problema. Se recomienda actualizar el componente afectado.
First Time Qdocs
Qdocs smart School
CPE cpe:2.3:a:qdocs:smart_school:7.0.0:*:*:*:*:*:*:*
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 8.8

13 Sep 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-13 19:15

Updated : 2024-09-19 01:38


NVD link : CVE-2024-8784

Mitre link : CVE-2024-8784

CVE.ORG link : CVE-2024-8784


JSON object : View

Products Affected

qdocs

  • smart_school
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')