i-Educar is free, fully online school management software that can be used by school secretaries, teachers, coordinators, and area managers. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the dynamic generation of HTML fields prior to the 2.9 branch. The file located at `ieducar/intranet/include/clsCampos.inc.php` does not properly validate or sanitize user-controlled input, leading to the vulnerability. Any page that uses this implementation is vulnerable, such as `intranet/educar_curso_lst.php?nm_curso=<payload>`, `intranet/atendidos_lst.php?nm_pessoa=<payload>`, `intranet/educar_abandono_tipo_lst?nome=<payload>`. Commit f2d768534aabc09b2a1fc8a5cc5f9c93925cb273 contains a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273 | Patch |
https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-08-28 21:15
Updated : 2024-09-13 20:03
NVD link : CVE-2024-45057
Mitre link : CVE-2024-45057
CVE.ORG link : CVE-2024-45057
JSON object : View
Products Affected
portabilis
- i-educar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')