Multiple SQL injection vulnerabilities in Command School Student Management System 1.06.01 allow remote attackers to execute arbitrary SQL commands via the id parameter in an edit action to (1) admin_school_names.php, (2) admin_subjects.php, (3) admin_grades.php, (4) admin_terms.php, (5) admin_school_years.php, (6) admin_sgrades.php, (7) admin_media_codes_1.php, (8) admin_infraction_codes.php, (9) admin_generations.php, (10) admin_relations.php, (11) admin_titles.php, or (12) health_allergies.php in sw/.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://osvdb.org/101879 | vdb entry |
http://osvdb.org/101884 | vdb entry |
http://osvdb.org/101883 | vdb entry |
http://osvdb.org/101885 | vdb entry |
http://osvdb.org/101874 | vdb entry |
http://osvdb.org/101881 | vdb entry |
http://osvdb.org/101878 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90175 | vdb entry |
http://osvdb.org/101877 | vdb entry |
http://www.securityfocus.com/bid/64707 | vdb entry |
http://osvdb.org/101880 | vdb entry |
http://osvdb.org/101882 | vdb entry |
http://osvdb.org/101876 | vdb entry |
http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html | exploit |
http://osvdb.org/101875 | vdb entry |