First published: Tue Sep 01 2020(Updated: )
SQL injection vulnerability exists in the password reset functionality of OS4Ed openSIS 7.3. The password_stf_email parameter in the password reset page /opensis/ResetUserInfo.php is vulnerable to SQL injection. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
OS4Ed OpenSIS | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-6140.
The severity of CVE-2020-6140 is critical with a CVSS score of 9.8.
The SQL injection vulnerability in CVE-2020-6140 allows an attacker to inject malicious SQL code into the password_stf_email parameter of the /opensis/ResetUserInfo.php page, potentially enabling them to execute unauthorized database queries.
The affected software version of CVE-2020-6140 is OS4Ed OpenSIS 7.3.
Currently, there is no specific patch or fix available for CVE-2020-6140. It is recommended to follow the vendor's recommendations and security best practices to mitigate the risk.