i-Educar is free, fully online school management software that can be used by school secretaries, teachers, coordinators, and area managers. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the dynamic generation of HTML fields prior to the 2.9 branch. The file located at `ieducar/intranet/include/clsCampos.inc.php` does not properly validate or sanitize user-controlled input, leading to the vulnerability. Any page that uses this implementation is vulnerable, such as `intranet/educar_curso_lst.php?nm_curso=<payload>`, `intranet/atendidos_lst.php?nm_pessoa=<payload>`, `intranet/educar_abandono_tipo_lst?nome=<payload>`. Commit f2d768534aabc09b2a1fc8a5cc5f9c93925cb273 contains a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj | Exploit Vendor Advisory |
https://github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273 | Patch |
Configurations
History
13 Sep 2024, 20:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Portabilis
Portabilis i-educar |
|
CWE | CWE-79 | |
References | () https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj - Exploit, Vendor Advisory | |
References | () https://github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273 - Patch |
06 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | i-Educar is free, fully online school management software that can be used by school secretaries, teachers, coordinators, and area managers. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the dynamic generation of HTML fields prior to the 2.9 branch. The file located at `ieducar/intranet/include/clsCampos.inc.php` does not properly validate or sanitize user-controlled input, leading to the vulnerability. Any page that uses this implementation is vulnerable, such as `intranet/educar_curso_lst.php?nm_curso=<payload>`, `intranet/atendidos_lst.php?nm_pessoa=<payload>`, `intranet/educar_abandono_tipo_lst?nome=<payload>`. Commit f2d768534aabc09b2a1fc8a5cc5f9c93925cb273 contains a patch for the issue. |
28 Aug 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-28 21:15
Updated : 2024-09-13 20:03
NVD link : CVE-2024-45057
Mitre link : CVE-2024-45057
JSON object : View
Products Affected
portabilis
- i-educar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')