Description
Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27718 | Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file. |
References
| Link | Providers |
|---|---|
| https://github.com/OS4ED/openSIS-Classic/issues/191 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T02:44:10.835Z
Reserved: 2021-09-07T00:00:00.000Z
Link: CVE-2021-40543
No data.
Status : Modified
Published: 2021-10-11T13:15:07.457
Modified: 2024-11-21T06:24:21.803
Link: CVE-2021-40543
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD