Skip to main content

CVE-2023-45120: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Projectworlds Pvt. Limited Online Examination System

High
VulnerabilityCVE-2023-45120cvecve-2023-45120cwe-89
Published: Thu Dec 21 2023 (12/21/2023, 16:21:38 UTC)
Source: CVE
Vendor/Project: Projectworlds Pvt. Limited
Product: Online Examination System

Description

Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'qid' parameter of the /update.php?q=quiz&step=2 resource does not validate the characters received and they are sent unfiltered to the database.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:57:25 UTC

Technical Analysis

CVE-2023-45120 is a high-severity authenticated SQL Injection vulnerability affecting version 1.0 of the Online Examination System developed by Projectworlds Pvt. Limited. The vulnerability arises from improper neutralization of special characters in the 'qid' parameter within the /update.php?q=quiz&step=2 endpoint. Specifically, this parameter is not validated or sanitized before being incorporated into SQL queries, allowing an authenticated user to inject malicious SQL code. This flaw corresponds to CWE-89, which involves improper neutralization of special elements used in SQL commands. Exploiting this vulnerability can lead to unauthorized access, data manipulation, or deletion within the underlying database. The CVSS 3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring privileges but no user interaction. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where the Online Examination System is used to manage sensitive academic or assessment data. Attackers with authenticated access could leverage this flaw to extract sensitive information, alter exam results, or disrupt system availability, undermining the trustworthiness and reliability of the examination process.

Potential Impact

For European organizations, particularly educational institutions and certification bodies using the affected Online Examination System, this vulnerability poses a critical risk. Exploitation could lead to unauthorized disclosure of personal data of students and staff, manipulation of exam results, and potential disruption of examination services. This could result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational interruptions. The integrity of academic assessments could be compromised, affecting fairness and validity. Additionally, attackers might pivot from this system to other parts of the network if lateral movement is possible, increasing the overall security risk. Given the authenticated nature of the vulnerability, insider threats or compromised user credentials could facilitate exploitation, emphasizing the need for strong access controls and monitoring.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement input validation and parameterized queries or prepared statements for all database interactions involving user-supplied data, especially the 'qid' parameter in the /update.php endpoint. Code review and refactoring should be conducted to ensure no other parameters are vulnerable to SQL injection. Applying patches or updates from the vendor is ideal; if unavailable, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Additionally, enforce the principle of least privilege for database accounts used by the application to limit the impact of any successful injection. Regularly audit user accounts and monitor logs for suspicious activities indicative of exploitation attempts. Implement multi-factor authentication to reduce the risk of credential compromise. Finally, conduct security awareness training for users with access to the system to recognize and prevent credential misuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2023-10-04T14:28:12.264Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb7d8

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 2:57:25 PM

Last updated: 8/15/2025, 2:19:23 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats