First published: Tue Sep 01 2020(Updated: )
SQL injection vulnerability exists in the password reset functionality of OS4Ed openSIS 7.3. The username_stf_email parameter in the password reset page /opensis/ResetUserInfo.php is vulnerable to SQL injection. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
OS4Ed OpenSIS | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2020-6139.
CVE-2020-6139 has a severity score of 9.8, which is considered critical.
The affected software version is OS4Ed OpenSIS 7.3.
The vulnerability manifests as a SQL injection vulnerability in the password reset functionality of OS4Ed OpenSIS 7.3.
An attacker can exploit this vulnerability by sending an HTTP request to the password reset page /opensis/ResetUserInfo.php with a malicious value in the username_stf_email parameter.