First published: Tue Sep 01 2020(Updated: )
An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheckOthers.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
OS4Ed OpenSIS | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-6124 is high.
The affected software of CVE-2020-6124 is OS4Ed OpenSIS 7.3.
The vulnerability CVE-2020-6124 allows an attacker to perform SQL injection by exploiting the email parameter in the page EmailCheckOthers.php of OS4Ed OpenSIS 7.3.
Yes, an attacker needs to make an authenticated HTTP request to trigger the vulnerability CVE-2020-6124.
You can find more information about CVE-2020-6124 at the following link: [CVE-2020-6124](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073)