vendor:
OpenEclass
by:
emaragkos
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: OpenEclass
Affected Version From: 1.7.3
Affected Version To: 1.7.3
Patch Exists: NO
Related CWE: N/A
CPE: a:gunet:openeclass:1.7.3
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 12 (Apache 2.2.22, PHP 5.3.10, MySQL 5.5.38)
2019
GUnet OpenEclass E-learning platform 1.7.3 – ‘uname’ SQL Injection
GUnet OpenEclass <= 1.7.3 E-learning platform is vulnerable to an unauthenticated blind SQL injection vulnerability in the 'uname' post parameter. An attacker can exploit this vulnerability by sending a specially crafted request with a time-based blind SQLi payload and measuring the response time. If the response time is greater than 5 seconds, then the application is vulnerable.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in SQL queries.