First published: Tue Sep 01 2020(Updated: )
SQL injection vulnerability exists in the password reset functionality of OS4Ed openSIS 7.3. The password_stf_email parameter in the password reset page /opensis/ResetUserInfo.php is vulnerable to SQL injection. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
OS4Ed OpenSIS | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-6137.
The title of this vulnerability is 'SQL injection vulnerability exists in the password reset functionality of OS4Ed openSIS 7.3.'
The severity of CVE-2020-6137 is critical with a severity value of 9.8.
The OS4Ed openSIS version 7.3 is affected by CVE-2020-6137.
An attacker can exploit CVE-2020-6137 by sending an HTTP request with a malicious payload to the password reset page /opensis/ResetUserInfo.php.