openSIS 漏洞列表
共找到 20 个与 openSIS 相关的漏洞
📅 加载漏洞趋势中...
-
openSIS v9.1存在路径遍历(CVE-2023-38879) 无POC
openSIS v9.1存在路径遍历,攻击者可以获取服务器敏感文件 -
CVE-2020-6637: OpenSIS 7.3 - SQL Injection POC
OpenSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php. -
CVE-2021-40542: Opensis-Classic 8.0 - Cross-Site Scripting POC
Opensis-Classic Version 8.0 is affected by cross-site scripting. An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php. -
CVE-2021-40651: OS4Ed OpenSIS Community 8.0 - Local File Inclusion POC
OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file. -
CVE-2021-41691: openSIS Student Information System 8.0 SQL Injection POC
openSIS Student Information System version 8.0 is susceptible to SQL injection via the student_id and TRANSFER[SCHOOL] parameters in POST request sent to /TransferredOutModal.php. -
CVE-2023-38879: openSIS v9.0 - Path Traversal POC
A path traversal vulnerability exists in openSIS Classic Community Edition v9.0 via the 'filename' parameter in DownloadWindow.php. An unauthenticated remote attacker can exploit this to read arbitrary files on the server by manipulating file paths. -
CVE-2024-35584: openSIS < 9.1 - SQL Injection POC
SQL injection vulnerability in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1, 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from "X-Forwarded-For" header and appends it to a SQL INSERT statement directly, leading to SQL Injection. -
CVE-2024-51211: openSIS Classic v9.1 - SQL Injection POC
SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands. -
CVE-2020-6637: OpenSIS 7.3 - SQL Injection POC
OpenSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php. -
CVE-2021-40542: Opensis-Classic 8.0 - Cross-Site Scripting POC
Opensis-Classic Version 8.0 is affected by cross-site scripting. An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php. -
CVE-2021-40651: OS4Ed OpenSIS Community 8.0 - Local File Inclusion POC
OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file. -
CVE-2021-41691: openSIS Student Information System 8.0 SQL Injection POC
openSIS Student Information System version 8.0 is susceptible to SQL injection via the student_id and TRANSFER[SCHOOL] parameters in POST request sent to /TransferredOutModal.php. -
CVE-2023-38879: openSIS v9.0 - Path Traversal POC
A path traversal vulnerability exists in openSIS Classic Community Edition v9.0 via the 'filename' parameter in DownloadWindow.php. An unauthenticated remote attacker can exploit this to read arbitrary files on the server by manipulating file paths. -
CVE-2024-35584: openSIS < 9.1 - SQL Injection POC
SQL injection vulnerability in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1, 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from "X-Forwarded-For" header and appends it to a SQL INSERT statement directly, leading to SQL Injection. -
CVE-2024-51211: openSIS Classic v9.1 - SQL Injection POC
SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands. -
opensis-installer: openSIS Installation Wizard POC
openSIS is susceptible to the Installation page exposure due to misconfiguration. -
opensis-lfi: openSIS 5.1 - Local File Inclusion POC
openSIS 5.1 is vulnerable to local file inclusion and allows attackers to obtain potentially sensitive information by executing arbitrary local scripts in the context of the web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible. -
openSIS v9.0 /DownloadWindow.php 目录遍历漏洞(CVE-2023-38879) 无POC
openSIS Classic Community Edition v9.0 存在路径遍历漏洞。攻击者可以通过操控 DownloadWindow.php 文件中的 filename 参数,读取服务器上的任意文件。此漏洞允许未经身份验证的远程攻击者访问敏感文件,可能导致信息泄露。 -
OpenSIS 8.0 CVE-2021-39378 SQL 注入漏洞 无POC
openSIS 8.0 中存在SQL注入漏洞。该漏洞是由于NamesList.php中对参数中的恶意数据校验不足导致的。 -
openSIS登录口SQL注入漏洞(CVE-2020-6141,CVE-2020-6637) 无POC
OS4Ed openSIS 7.3的登录功能中存在一个可利用的SQL注入漏洞。特制的HTTP请求可能导致SQL注入。攻击者可以发送HTTP请求来触发此漏洞。