First published: Sat Feb 08 2020(Updated: )
Open-School Community Edition 2.2 does not properly restrict access to the export functionality, which allows remote authenticated users to obtain sensitive information via the r parameter with the value export to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-school Open-school | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-9127 is medium with a severity value of 6.5.
Open-School Community Edition version 2.2 is affected by CVE-2014-9127.
CVE-2014-9127 allows remote authenticated users to obtain sensitive information by exploiting the unrestricted access to the export functionality.
To fix CVE-2014-9127, it is recommended to update to a version of Open-School Community Edition that includes the necessary security patches.
You can find more information about CVE-2014-9127 at http://packetstormsecurity.com/files/130090/OpenSchool-Community-Edition-2.2-XSS-Access-Bypass.html.