First published: Tue Oct 12 2021(Updated: )
An SQL Injection vulnerability exists in openSIS Classic 8.0 via the 1) ADDR_CONT_USRN, 2) ADDR_CONT_PSWD, 3) SECN_CONT_USRN or 4) SECN_CONT_PSWD parameters in HoldAddressFields.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OS4Ed OpenSIS | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40618 is an SQL Injection vulnerability that exists in openSIS Classic 8.0.
The SQL Injection vulnerability in CVE-2021-40618 can be exploited through the ADDR_CONT_USRN, ADDR_CONT_PSWD, SECN_CONT_USRN, or SECN_CONT_PSWD parameters in HoldAddressFields.php.
CVE-2021-40618 has a severity rating of 9.8 (critical).
To fix the SQL Injection vulnerability in CVE-2021-40618, it is recommended to update to a version of openSIS Classic that is not affected by this vulnerability or apply the necessary patches provided by the vendor.
More information about CVE-2021-40618 can be found at the following reference: [link](https://github.com/OS4ED/openSIS-Classic/issues/193)