Vulnerability Description
TripSpark VEO Transportation-2.2.x-XP_BB-20201123-184084 NovusEDU-2.2.x-XP_BB-20201123-184084 allows unsafe data inputs in POST body parameters from end users without sanitizing using server-side logic. It was possible to inject custom SQL commands into the "Student Busing Information" search queries.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trispark | Novusedu | 2.2.x-xp_bb-20201123-184084 |
| Trispark | Veo Transportation | 2.2.x-xp_bb-20201123-184084os |
Related Weaknesses (CWE)
References
- http://tripspark.comProduct
- http://veo.comBroken Link
- https://susos.co/blog/f/cve-disclosureuncovered-sql-injection-in-tripspark-veo-tExploitThird Party Advisory
- http://tripspark.comProduct
- http://veo.comBroken Link
- https://susos.co/blog/f/cve-disclosureuncovered-sql-injection-in-tripspark-veo-tExploitThird Party Advisory
FAQ
What is CVE-2021-3262?
CVE-2021-3262 is a vulnerability with a CVSS score of 9.8 (CRITICAL). TripSpark VEO Transportation-2.2.x-XP_BB-20201123-184084 NovusEDU-2.2.x-XP_BB-20201123-184084 allows unsafe data inputs in POST body parameters from end users without sanitizing using server-side logi...
How severe is CVE-2021-3262?
CVE-2021-3262 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-3262?
Check the references section above for vendor advisories and patch information. Affected products include: Trispark Novusedu, Trispark Veo Transportation.