CVE-2022-2489
SourceCodester Simple E-Learning System classRoom.php sql injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in SourceCodester Simple E-Learning System 1.0. It has been rated as critical. This issue affects some unknown processing of the file classRoom.php. The manipulation of the argument classCode with the input 1'||(SELECT 0x6770715a WHERE 8795=8795 AND (SELECT 8342 FROM(SELECT COUNT(*),CONCAT(0x7171786b71,(SELECT (ELT(8342=8342,1))),0x717a7a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Se ha encontrado una vulnerabilidad en SourceCodester Simple E-Learning System versión 1.0. Se ha calificado como crítica. Este problema afecta a un procesamiento desconocido del archivo classRoom.php. La manipulación del argumento classCode con la entrada 1"||(SELECT 0x6770715a WHERE 8795=8795 AND (SELECT 8342 FROM(SELECT COUNT(*),CONCAT(0x7171786b71,(SELECT (ELT(8342=8342,1)),0x717a7a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||" conlleva una inyección sql. El ataque puede iniciarse de forma remota. La explotación ha sido divulgada al público y puede ser usada
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2022-07-20 CVE Reserved
- 2022-07-20 CVE Published
- 2025-04-14 EPSS Updated
- 2025-04-15 CVE Updated
- 2025-04-15 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md | 2025-04-15 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Simple E-learning System Project Search vendor "Simple E-learning System Project" | Simple E-learning System Search vendor "Simple E-learning System Project" for product "Simple E-learning System" | 1.0 Search vendor "Simple E-learning System Project" for product "Simple E-learning System" and version "1.0" | - |
Affected
|