First published: Tue Sep 01 2020(Updated: )
An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheck.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
OS4ED openSIS-Classic | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-6123.
The severity of CVE-2020-6123 is high with a severity value of 8.8.
The software version affected by CVE-2020-6123 is OS4Ed OpenSIS 7.3.
The sql injection vulnerability in CVE-2020-6123 can be exploited through the email parameter in the page EmailCheck.php, allowing an attacker to perform unauthorized SQL queries.
To fix the sql injection vulnerability in CVE-2020-6123, it is recommended to update to a patched version of OS4Ed OpenSIS.