A vulnerability was found in QDocs Smart School 6.4.1. It has been classified as critical. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. The manipulation of the argument searchdata[0][title]/searchdata[0][searchfield]/searchdata[0][searchvalue] leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-241647. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://vuldb.com/?ctiid.241647 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.241647 | Third Party Advisory | 
| http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://vuldb.com/?ctiid.241647 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.241647 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2023-10-10 17:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5495
Mitre link : CVE-2023-5495
CVE.ORG link : CVE-2023-5495
JSON object : View
Products Affected
                qdocs
- smart_school
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
