The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-12-23 05:15
Updated : 2022-01-04 11:32
NVD link : CVE-2021-44599
Mitre link : CVE-2021-44599
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
online_enrollment_management_system_project
- online_enrollment_management_system