CVE-2020-6143
📋 TL;DR
This is a critical remote code execution vulnerability in OS4Ed openSIS 7.4's installation functionality. Attackers can inject malicious PHP code through the password parameter during installation, allowing them to execute arbitrary commands on the server. Any organization using openSIS 7.4 with the default installation is affected.
💻 Affected Systems
- OS4Ed openSIS
📦 What is this software?
Opensis by Os4ed
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install backdoors, steal sensitive student data, pivot to internal networks, and maintain persistent access.
Likely Case
Webshell deployment leading to data exfiltration, credential theft, and potential ransomware deployment on the affected server.
If Mitigated
Limited impact with proper network segmentation and monitoring, potentially only affecting the openSIS application server.
🎯 Exploit Status
Exploitation is straightforward - attackers send a crafted HTTP request to the install/Step5.php endpoint with malicious PHP code in the password parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: openSIS 7.5 and later
Vendor Advisory: https://www.os4ed.com/
Restart Required: No
Instructions:
1. Upgrade to openSIS 7.5 or later. 2. Remove or restrict access to the install directory after installation. 3. Review Data.php file for any malicious code.
🔧 Temporary Workarounds
Remove Install Directory
linuxDelete or restrict access to the install directory after installation completes
rm -rf /path/to/opensis/install/
chmod 000 /path/to/opensis/install/
Web Server Access Restriction
allConfigure web server to block access to install directory
# Apache: Add to .htaccess
Deny from all
# Nginx: Add to config
location /install/ { deny all; }
🧯 If You Can't Patch
- Immediately remove or restrict access to the install directory using web server configuration
- Implement strict network segmentation and WAF rules to block requests to install endpoints
🔍 How to Verify
Check if Vulnerable:
Check if install/Step5.php is accessible via HTTP and if openSIS version is 7.4. Review Data.php file for suspicious PHP code.
Check Version:
Check version in application interface or review release notes in installation directory
Verify Fix Applied:
Confirm install directory is inaccessible via HTTP and version is upgraded to 7.5+. Verify Data.php contains no malicious code.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to install/Step5.php with unusual parameters
- File modifications to Data.php
- Unusual PHP process execution
Network Indicators:
- HTTP POST requests to install endpoints with PHP code in parameters
- Outbound connections from web server to suspicious IPs
SIEM Query:
source="web_logs" AND (uri="/install/Step5.php" OR uri="/Data.php") AND (method="POST" OR status=200)