CVE-2020-6132

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-6132
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-6132.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-6132
Published
2020-09-01T15:15:12.420Z
Modified
2025-11-20T11:28:14.971839Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

SQL injection vulnerability exists in the ID parameters of OS4Ed openSIS 7.3 pages. The id parameter in the page ChooseCP.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

References

Affected packages

Git / github.com/os4ed/opensis-responsive-design

Affected ranges

Type
GIT
Repo
https://github.com/os4ed/opensis-responsive-design
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Ver7.*

Ver7.0Prod
Ver7.0Prod_update
Ver7.0beta1

v7.*

v7.1
v7.2
v7.3

ver7.*

ver7.1

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-6132.json"