The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-23T12:31:27
Updated: 2021-12-23T12:31:27
Reserved: 2021-12-06T00:00:00
Link: CVE-2021-44599
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-23T13:15:10.540
Modified: 2022-01-04T19:32:52.593
Link: CVE-2021-44599
JSON object: View
Redhat Information
No data.
CWE