SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/kutsa1/My-CVE/tree/main/CVE-2024-51211 |
History
Thu, 21 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Os4ed
Os4ed opensis-classic |
|
Weaknesses | CWE-89 | |
CPEs | cpe:2.3:a:os4ed:opensis-classic:9.1:*:*:*:*:*:*:* | |
Vendors & Products |
Os4ed
Os4ed opensis-classic |
|
Metrics |
cvssV3_1
|
Fri, 08 Nov 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-08T00:00:00
Updated: 2024-11-21T16:24:26.645Z
Reserved: 2024-10-28T00:00:00
Link: CVE-2024-51211
Vulnrichment
Updated: 2024-11-21T16:24:05.246Z
NVD
Status : Awaiting Analysis
Published: 2024-11-08T19:15:06.347
Modified: 2024-11-21T17:15:22.410
Link: CVE-2024-51211
Redhat
No data.