Multiple SQL injection vulnerabilities in Sourcecodester Pisay Online E-Learning System 1.0 allow remote unauthenticated attackers to bypass authentication and achieve Remote Code Execution (RCE) via the user_email, user_pass, and id parameters on the admin login-portal and the edit-lessons webpages.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/48439 | Exploit Third Party Advisory VDB Entry |
https://www.sourcecodester.com | Vendor Advisory |
https://www.exploit-db.com/exploits/48439 | Exploit Third Party Advisory VDB Entry |
https://www.sourcecodester.com | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/48439 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.sourcecodester.com - Vendor Advisory |
Information
Published : 2020-06-22 18:15
Updated : 2024-11-21 05:04
NVD link : CVE-2020-14972
Mitre link : CVE-2020-14972
CVE.ORG link : CVE-2020-14972
JSON object : View
Products Affected
pisay_online_e-learning_system_project
- pisay_online_e-learning_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')