CVE编号
CVE-2021-3239利用情况
暂无补丁情况
N/A披露时间
2021-02-16漏洞描述
E-Learning System 1.0 suffers from an unauthenticated SQL injection vulnerability, which allows remote attackers to execute arbitrary code on the hosting web server and gain a reverse shell.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/CVE... | |
https://github.com/TCSWT/E-Learning-System/blob/main/README.md | |
https://packetstormsecurity.com/files/160966/E-Learning-System-1.0-SQL-Inject... | |
https://www.exploit-db.com/exploits/49434 | |
https://www.sourcecodester.com/php/12808/e-learning-system-using-phpmysqli.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | e-learning_system_project | e-learning_system | 1.0 | - | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | kernel | * |
Up to (excluding) 4.14.238-182.421.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | kernel | * |
Up to (excluding) 3.10.0-1160.41.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | kernel | * |
Up to (excluding) 5.3.18-lp152.78.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | kernel | * |
Up to (excluding) 5.3.18-38.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_6 | kernel | * |
Up to (excluding) 4.1.12-124.53.5.el6uek |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | kernel | * |
Up to (excluding) 5.4.17-2102.203.5.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | kernel | * |
Up to (excluding) 4.18.0-305.10.2.el8_4 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | kernel | * |
Up to (excluding) 4.12.14-16.59.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04.6_lts | linux-azure | * |
Up to (excluding) 4.15.0-1121.134~14.04.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | linux | * |
Up to (excluding) 4.15.0-149.153 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...