The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of "opensisBackup<date>.sql" (e.g. "opensisBackup07-20-2023.sql"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-42647 The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of "opensisBackup<date>.sql" (e.g. "opensisBackup07-20-2023.sql"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T17:54:39.233Z

Reserved: 2023-07-25T00:00:00

Link: CVE-2023-38880

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-20T19:15:08.600

Modified: 2024-11-21T08:14:21.227

Link: CVE-2023-38880

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses