Command School Student Management System /sw/admin_media_codes_1.php id Parameter SQL Injection
2014-01-07T00:00:00
ID EDB-ID:38948 Type exploitdb Reporter AtT4CKxT3rR0r1ST Modified 2014-01-07T00:00:00
Description
Command School Student Management System /sw/admin_media_codes_1.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform
source: http://www.securityfocus.com/bid/64707/info
Command School Student Management System is prone to the following security vulnerabilities:
1. Multiple SQL-injection vulnerabilities
2. A cross-site request forgery vulnerability
3. A cross-site scripting vulnerability
4. An HTML injection vulnerability
5. A security-bypass vulnerability
Exploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.
Command School Student Management System 1.06.01 is vulnerable; other versions may also be affected.
http://www.example.com/sw/admin_media_codes_1.php?action=edit&id=null+and+1=2+union+select+version(),2,3
{"id": "EDB-ID:38948", "hash": "251329db0cbd97a368abff40743ac661", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Command School Student Management System /sw/admin_media_codes_1.php id Parameter SQL Injection", "description": "Command School Student Management System /sw/admin_media_codes_1.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "published": "2014-01-07T00:00:00", "modified": "2014-01-07T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/38948/", "reporter": "AtT4CKxT3rR0r1ST ", "references": [], "cvelist": ["CVE-2014-1636"], "lastseen": "2016-02-04T09:11:20", "history": [], "viewCount": 1, "enchantments": {"score": {"value": 7.1, "vector": "NONE", "modified": "2016-02-04T09:11:20"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-1636"]}, {"type": "exploitdb", "idList": ["EDB-ID:38953", "EDB-ID:38950", "EDB-ID:38955", "EDB-ID:38954", "EDB-ID:38952", "EDB-ID:38946", "EDB-ID:38951", "EDB-ID:38947", "EDB-ID:38949", "EDB-ID:38944"]}], "modified": "2016-02-04T09:11:20"}, "vulnersScore": 7.1}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/38948/", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_media_codes_1.php?action=edit&id=null+and+1=2+union+select+version(),2,3", "osvdbidlist": ["101880"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:13:44", "bulletinFamily": "NVD", "description": "Multiple SQL injection vulnerabilities in Command School Student Management System 1.06.01 allow remote attackers to execute arbitrary SQL commands via the id parameter in an edit action to (1) admin_school_names.php, (2) admin_subjects.php, (3) admin_grades.php, (4) admin_terms.php, (5) admin_school_years.php, (6) admin_sgrades.php, (7) admin_media_codes_1.php, (8) admin_infraction_codes.php, (9) admin_generations.php, (10) admin_relations.php, (11) admin_titles.php, or (12) health_allergies.php in sw/.", "modified": "2018-10-30T16:26:00", "id": "CVE-2014-1636", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1636", "published": "2014-01-22T19:55:00", "title": "CVE-2014-1636", "type": "cve", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "exploitdb": [{"lastseen": "2016-02-04T09:11:04", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_school_years.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38946", "href": "https://www.exploit-db.com/exploits/38946/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_school_years.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_school_years.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38946/"}, {"lastseen": "2016-02-04T09:11:51", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_titles.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38952", "href": "https://www.exploit-db.com/exploits/38952/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_titles.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_titles.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38952/"}, {"lastseen": "2016-02-04T09:12:10", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_school_names.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38954", "href": "https://www.exploit-db.com/exploits/38954/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_school_names.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_school_names.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38954/"}, {"lastseen": "2016-02-04T09:12:20", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_subjects.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38955", "href": "https://www.exploit-db.com/exploits/38955/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_subjects.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_subjects.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38955/"}, {"lastseen": "2016-02-04T09:11:36", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_generations.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38950", "href": "https://www.exploit-db.com/exploits/38950/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_generations.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_generations.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38950/"}, {"lastseen": "2016-02-04T09:12:00", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/health_allergies.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38953", "href": "https://www.exploit-db.com/exploits/38953/", "type": "exploitdb", "title": "Command School Student Management System /sw/health_allergies.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/health_allergies.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38953/"}, {"lastseen": "2016-02-04T09:10:50", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_grades.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38944", "href": "https://www.exploit-db.com/exploits/38944/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_grades.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n\r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n\r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n\r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n\r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_grades.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38944/"}, {"lastseen": "2016-02-04T09:10:57", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_terms.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38945", "href": "https://www.exploit-db.com/exploits/38945/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_terms.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_terms.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38945/"}, {"lastseen": "2016-02-04T09:11:11", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_sgrades.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38947", "href": "https://www.exploit-db.com/exploits/38947/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_sgrades.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_sgrades.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38947/"}, {"lastseen": "2016-02-04T09:11:28", "bulletinFamily": "exploit", "description": "Command School Student Management System /sw/admin_infraction_codes.php id Parameter SQL Injection. CVE-2014-1636. Webapps exploit for php platform", "modified": "2014-01-07T00:00:00", "published": "2014-01-07T00:00:00", "id": "EDB-ID:38949", "href": "https://www.exploit-db.com/exploits/38949/", "type": "exploitdb", "title": "Command School Student Management System /sw/admin_infraction_codes.php id Parameter SQL Injection", "sourceData": "source: http://www.securityfocus.com/bid/64707/info\r\n \r\nCommand School Student Management System is prone to the following security vulnerabilities:\r\n \r\n1. Multiple SQL-injection vulnerabilities\r\n2. A cross-site request forgery vulnerability\r\n3. A cross-site scripting vulnerability\r\n4. An HTML injection vulnerability\r\n5. A security-bypass vulnerability\r\n \r\nExploiting these issues could allow an attacker to run malicious HTML and script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass certain security restrictions to perform unauthorized actions.\r\n \r\nCommand School Student Management System 1.06.01 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/sw/admin_infraction_codes.php?action=edit&id=null+and+1=2+union+select+version()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/38949/"}]}