Skip to main content

CVE-2023-6618: CWE-73 File Inclusion in SourceCodester Simple Student Attendance System

Medium
VulnerabilityCVE-2023-6618cvecve-2023-6618cwe-73
Published: Fri Dec 08 2023 (12/08/2023, 17:00:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Simple Student Attendance System

Description

A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247255.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:57:02 UTC

Technical Analysis

CVE-2023-6618 is a medium severity vulnerability identified in SourceCodester Simple Student Attendance System version 1.0. The vulnerability is classified under CWE-73, which corresponds to improper file inclusion. Specifically, the issue arises from the manipulation of the 'page' parameter in the index.php file, which allows an attacker to include arbitrary files. This can lead to unauthorized disclosure of sensitive information, modification of data, or disruption of service depending on the files included and the server configuration. The vulnerability requires low privileges (PR:L) and no user interaction (UI:N), but the attacker must have access to the network (AV:A), meaning exploitation is possible remotely but typically within the same network or VPN. The CVSS v3.1 base score is 5.5, reflecting a medium severity level with impacts on confidentiality, integrity, and availability, albeit limited in scope and requiring some privileges. No public exploits are currently known in the wild, and no patches have been linked yet. The vulnerability could be exploited to read sensitive files or execute arbitrary code if combined with other vulnerabilities or misconfigurations, making it a notable risk for organizations using this software.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment of the affected Simple Student Attendance System 1.0. Educational institutions or organizations using this system to track attendance could face unauthorized access to student data, including personally identifiable information (PII), which is subject to strict GDPR regulations. The file inclusion flaw could allow attackers to access configuration files, credentials, or other sensitive data, potentially leading to data breaches and compliance violations. Additionally, if exploited to alter attendance records or disrupt system availability, it could undermine operational integrity and trust. The medium severity score suggests moderate risk, but the potential for cascading effects, such as lateral movement within a network or privilege escalation, could increase the impact. European organizations must consider the reputational damage and legal consequences of data exposure, especially in sectors like education where data protection is critical.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are running SourceCodester Simple Student Attendance System version 1.0 and assess exposure to the vulnerable index.php 'page' parameter. Since no official patch is currently available, immediate mitigation includes implementing strict input validation and sanitization on the 'page' parameter to prevent arbitrary file inclusion. Employing web application firewalls (WAFs) with rules to detect and block file inclusion attempts can provide an additional layer of defense. Restricting network access to the application to trusted users and networks reduces the attack surface, given the attack vector requires network access. Monitoring logs for suspicious requests targeting the 'page' parameter is also recommended. Long-term, organizations should plan to upgrade to a patched version once available or consider alternative attendance systems with better security track records. Conducting regular security assessments and penetration tests focusing on file inclusion and input validation vulnerabilities will help identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-12-08T09:54:32.552Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835d30c182aa0cae216c46a

Added to database: 5/27/2025, 2:58:20 PM

Last enriched: 7/6/2025, 2:57:02 AM

Last updated: 7/29/2025, 4:53:01 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats