Skip to main content

CVE-2023-45115: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Projectworlds Pvt. Limited Online Examination System

High
VulnerabilityCVE-2023-45115cvecve-2023-45115cwe-89
Published: Thu Dec 21 2023 (12/21/2023, 15:36:52 UTC)
Source: CVE
Vendor/Project: Projectworlds Pvt. Limited
Product: Online Examination System

Description

Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'ch' parameter of the /update.php?q=addqns resource does not validate the characters received and they are sent unfiltered to the database.

AI-Powered Analysis

AILast updated: 07/04/2025, 04:55:27 UTC

Technical Analysis

CVE-2023-45115 is a high-severity SQL Injection vulnerability affecting version 1.0 of the Online Examination System developed by Projectworlds Pvt. Limited. The vulnerability arises from improper neutralization of special characters in the 'ch' parameter of the /update.php?q=addqns endpoint. This parameter is used to add questions to the system but does not validate or sanitize input before incorporating it into SQL commands. As a result, authenticated users with privileges to access this endpoint can inject malicious SQL code, potentially manipulating the backend database. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands. The CVSS 3.1 base score is 8.8, reflecting a high impact with network attack vector, low attack complexity, requiring privileges but no user interaction, and affecting confidentiality, integrity, and availability. Exploitation could allow attackers to read, modify, or delete sensitive examination data, alter question banks, or escalate privileges within the system. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where the Online Examination System is used to conduct high-stakes or regulated assessments. The lack of available patches increases the urgency for mitigation and risk management.

Potential Impact

For European organizations, particularly educational institutions, certification bodies, and training providers using the Online Examination System, this vulnerability poses a serious threat. Exploitation could lead to unauthorized disclosure of examination content, manipulation of exam questions or results, and disruption of examination services. This undermines the integrity and trustworthiness of certification processes, potentially affecting compliance with educational standards and regulations such as GDPR if personal data is exposed. Furthermore, the availability impact could disrupt examination schedules, causing operational and reputational damage. The requirement for authentication limits exposure to internal or credentialed users, but insider threats or compromised accounts could still exploit this flaw. Given the increasing reliance on digital examination platforms in Europe, the vulnerability could have widespread consequences if not addressed promptly.

Mitigation Recommendations

Organizations should immediately audit their use of the Online Examination System version 1.0 and restrict access to the /update.php?q=addqns endpoint to only highly trusted users. Implement input validation and sanitization on the 'ch' parameter to neutralize special SQL characters, ideally using parameterized queries or prepared statements to prevent injection. Since no official patch is currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Monitor logs for suspicious activity related to the vulnerable endpoint. Additionally, enforce strong authentication and session management controls to reduce the risk of credential compromise. If feasible, migrate to a more secure or updated examination platform. Conduct regular security assessments and penetration testing focused on injection flaws to proactively identify similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2023-10-04T14:28:12.264Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb7ce

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 4:55:27 AM

Last updated: 7/7/2025, 8:30:13 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats