A vulnerability was found in QDocs Smart School 6.4.1. It has been classified as critical. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. The manipulation of the argument searchdata[0][title]/searchdata[0][searchfield]/searchdata[0][searchvalue] leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-241647. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://vuldb.com/?ctiid.241647 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.241647 | Third Party Advisory |
http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://vuldb.com/?ctiid.241647 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.241647 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-10-10 17:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5495
Mitre link : CVE-2023-5495
CVE.ORG link : CVE-2023-5495
JSON object : View
Products Affected
qdocs
- smart_school
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')