{"id":"CVE-2020-6139","details":"SQL injection vulnerability exists in the password reset functionality of OS4Ed openSIS 7.3. The username_stf_email parameter in the password reset page /opensis/ResetUserInfo.php is vulnerable to SQL injection. An attacker can send an HTTP request to trigger this vulnerability.","modified":"2026-04-12T00:02:09.792192Z","published":"2020-09-01T21:15:12.893Z","references":[{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/OS4ED/openSIS-Classic","events":[{"introduced":"0"},{"last_affected":"1a618f9606af177af1f137d1424ff7b3c4b14b56"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"7.3"}],"cpe":"cpe:2.3:a:os4ed:opensis:7.3:*:*:*:-:*:*:*","source":"CPE_FIELD"}}],"versions":["Ver7.0Prod_update","Ver7.0beta1","v7.1","v7.2","v7.3","ver7.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-6139.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}