CVE-2020-6124

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-6124
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-6124.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-6124
Published
2020-09-01T15:15:12Z
Modified
2025-01-14T08:46:48.041901Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheckOthers.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

References

Affected packages

Git / github.com/os4ed/opensis-responsive-design

Affected ranges

Type
GIT
Repo
https://github.com/os4ed/opensis-responsive-design
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Ver7.*

Ver7.0Prod
Ver7.0Prod_update
Ver7.0beta1

v7.*

v7.1
v7.2
v7.3

ver7.*

ver7.1