cvelist/2020/6xxx/CVE-2020-6123.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-01-07 16:01:04 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-6123",
2020-09-01 14:02:10 +00:00
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OS4Ed",
"version": {
"version_data": [
{
"version_value": "OS4Ed openSIS 7.3"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073"
}
]
2020-01-07 16:01:04 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-09-01 14:02:10 +00:00
"value": "An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheck.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability."
2020-01-07 16:01:04 +00:00
}
]
}
}