Description
Multiple SQL injection vulnerabilities in ClassSystem 2.3 allow remote attackers to execute arbitrary SQL commands via the teacher_id parameter in (1) class/HomepageMain.php and (2) class/HomepageTop.php, and (3) the message_id parameter in class/MessageReply.php.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Unohope · textwebappsphp
https://www.exploit-db.com/exploits/31848
exploitdb
WORKING POC
VERIFIED
by Unohope · textwebappsphp
https://www.exploit-db.com/exploits/31846
exploitdb
WORKING POC
VERIFIED
by Unohope · textwebappsphp
https://www.exploit-db.com/exploits/31847
References (9)
Core 9
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30365
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/45640
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/492583/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42650
Exploit x_refsource_misc
http://www.chroot.org/exploits/chroot_uu_005
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29372
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/45639
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1664
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/45641
Scores
EPSS
0.0169
EPSS Percentile
82.4%
Details
CWE
CWE-89
Status
published
Products (1)
netlab/classsystem
2.3
Published
Apr 06, 2009
Tracked Since
Feb 18, 2026