CVE-2020-6123

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-6123
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-6123.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-6123
Published
2020-09-01T14:15:13Z
Modified
2025-01-08T07:28:13.042894Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheck.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

References

Affected packages

Git / github.com/os4ed/opensis-responsive-design

Affected ranges

Type
GIT
Repo
https://github.com/os4ed/opensis-responsive-design
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Ver7.*

Ver7.0Prod
Ver7.0Prod_update
Ver7.0beta1

v7.*

v7.1
v7.2
v7.3

ver7.*

ver7.1