First published: Mon Aug 08 2022(Updated: )
A vulnerability classified as critical has been found in SourceCodester Online Class and Exam Scheduling System 1.0. Affected is an unknown function of the file /pages/class_sched.php. The manipulation of the argument class with the input '||(SELECT 0x684d6b6c WHERE 5993=5993 AND (SELECT 2096 FROM(SELECT COUNT(*),CONCAT(0x717a786b71,(SELECT (ELT(2096=2096,1))),0x717a626271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-205830 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Online Class And Exam Scheduling System | =1.0 | |
Online Class And Exam Scheduling System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2706 is classified as a critical vulnerability.
CVE-2022-2706 affects version 1.0 of the Online Class and Exam Scheduling System.
CVE-2022-2706 allows for SQL injection attacks due to improper input validation.
To fix CVE-2022-2706, it is recommended to update the software to a patched version or implement input validation and sanitization.
Yes, CVE-2022-2706 can potentially lead to data breaches through unauthorized database access.