An authentication bypass vulnerability in all versions of ValuePLUS Integrated University Management System (IUMS) allows unauthenticated, remote attackers to gain administrator privileges via the Teachers Web Panel (TWP) User ID or Password field. If exploited, the attackers could perform any actions with administrator privileges (e.g., enumerate/delete all the students' personal information or modify various settings).
References
Link | Resource |
---|---|
https://blog.ziaurrashid.com/sql-injection-auth-bypass-on-iums/ | Exploit Third Party Advisory |
https://blog.ziaurrashid.com/sql-injection-auth-bypass-on-iums/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.ziaurrashid.com/sql-injection-auth-bypass-on-iums/ - Exploit, Third Party Advisory |
Information
Published : 2019-04-12 03:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11196
Mitre link : CVE-2019-11196
CVE.ORG link : CVE-2019-11196
JSON object : View
Products Affected
vpcsbd
- integrated_university_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')