SB2020070177 - Multiple vulnerabilities in OS4Ed openSIS
Published: July 1, 2020 Updated: September 2, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2020-13381)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
2) Path traversal (CVE-ID: CVE-2020-13383)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
3) Improper access control (CVE-ID: CVE-2020-13382)
The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote attacker can send a specially crafted request and gain unauthorized access to the affected application.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://packetstormsecurity.com/files/158331/openSIS-7.4-Unauthenticated-PHP-Code-Execution.html
- https://github.com/OS4ED/openSIS-Responsive-Design/commits/master
- https://packetstormsecurity.com/files/158257/openSIS-7.4-SQL-Injection.html
- http://packetstormsecurity.com/files/158256/openSIS-7.4-Local-File-Inclusion.html
- https://github.com/OS4ED/openSIS-Responsive-Design/commit/1127ae0bb7c3a2883febeabc6b71ad8d73510de8
- http://packetstormsecurity.com/files/158255/openSIS-7.4-Incorrect-Access-Control.html