CVE-2024-8784

A vulnerability classified as critical was found in QDocs Smart School Management System 7.0.0. Affected by this vulnerability is an unknown functionality of the file /user/chat/mynewuser of the component Chat. The manipulation of the argument users[] with the input 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM as part of POST Request Parameter leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.1 is able to address this issue. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qdocs:smart_school:7.0.0:*:*:*:*:*:*:*

History

19 Sep 2024, 01:38

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 8.8
Summary
  • (es) Se encontró una vulnerabilidad clasificada como crítica en QDocs Smart School Management System 7.0.0. Esta vulnerabilidad afecta una funcionalidad desconocida del archivo /user/chat/mynewuser del componente Chat. La manipulación del argumento users[] con la entrada 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM como parte del parámetro de solicitud POST conduce a una inyección SQL. El ataque se puede lanzar de forma remota. El exploit se ha divulgado al público y puede utilizarse. La actualización a la versión 7.0.1 puede solucionar este problema. Se recomienda actualizar el componente afectado.
CPE cpe:2.3:a:qdocs:smart_school:7.0.0:*:*:*:*:*:*:*
First Time Qdocs smart School
Qdocs
References () https://codecanyon.net/item/smart-school-school-management-system/19426018 - () https://codecanyon.net/item/smart-school-school-management-system/19426018 - Product
References () https://github.com/bytium/vulnerability-research/blob/main/Advisory%20for%20Time-Based%20Blind%20SQL%20Injection%20in%20QDocs%20Smart%20School.md - () https://github.com/bytium/vulnerability-research/blob/main/Advisory%20for%20Time-Based%20Blind%20SQL%20Injection%20in%20QDocs%20Smart%20School.md - Third Party Advisory
References () https://smart-school.in/article/version-7-0-1 - () https://smart-school.in/article/version-7-0-1 - Release Notes
References () https://vuldb.com/?ctiid.277435 - () https://vuldb.com/?ctiid.277435 - Permissions Required
References () https://vuldb.com/?id.277435 - () https://vuldb.com/?id.277435 - Third Party Advisory
References () https://vuldb.com/?submit.407385 - () https://vuldb.com/?submit.407385 - Third Party Advisory

13 Sep 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-13 19:15

Updated : 2024-09-19 01:38


NVD link : CVE-2024-8784

Mitre link : CVE-2024-8784

CVE.ORG link : CVE-2024-8784


JSON object : View

Products Affected

qdocs

  • smart_school
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')