Remote Code Execution in OS4Ed openSIS by Improper Input Validation
CVE-2020-6144

10CRITICAL

Key Information:

Vendor

Os4ed

Status
Vendor
CVE Published:
1 September 2020

What is CVE-2020-6144?

A vulnerability in the installation process of OS4Ed openSIS 7.4 allows remote attackers to execute arbitrary PHP code due to improper handling of user input. This occurs within the username variable during the installation phase, specifically in install/Step5.php. An attacker can exploit this vulnerability by sending a specially crafted HTTP request that leads to the injection of malicious PHP code into the Data.php file, compromising the integrity of the system.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

OS4Ed OS4Ed openSIS 7.4

References

EPSS Score

10% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.