CVE-2024-41243

5.3 MEDIUM

📋 TL;DR

An unauthenticated attacker can access student marks data through the /smsa/view_marks.php endpoint in Kashipara Responsive School Management System. This affects all installations of version 3.2.0 that are exposed to network access. The vulnerability allows unauthorized viewing of sensitive academic information.

💻 Affected Systems

Products:
  • Kashipara Responsive School Management System
Versions: v3.2.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of v3.2.0 regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exfiltration of all student academic records, leading to privacy violations, academic fraud, or blackmail opportunities.

🟠

Likely Case

Unauthorized viewing of student marks by external actors, compromising student privacy and academic integrity.

🟢

If Mitigated

Limited exposure if system is behind proper authentication controls or network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint with no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check vendor website for updated version
2. Replace vulnerable view_marks.php file
3. Implement proper authentication checks

🔧 Temporary Workarounds

Access Control Implementation

all

Add authentication checks to view_marks.php file

Edit /smsa/view_marks.php to include session validation and user role checks

Web Server Restriction

all

Block access to vulnerable endpoint at web server level

# Apache: <Location /smsa/view_marks.php> Require valid-user </Location>
# Nginx: location /smsa/view_marks.php { deny all; }

🧯 If You Can't Patch

  • Place system behind VPN or network segmentation
  • Implement WAF rules to block access to /smsa/view_marks.php

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[target]/smsa/view_marks.php without authentication. If marks data is returned, system is vulnerable.

Check Version:

Check system documentation or admin panel for version information

Verify Fix Applied:

Attempt same access after fix - should receive authentication error or access denied.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to /smsa/view_marks.php
  • Multiple failed authentication attempts followed by successful marks access

Network Indicators:

  • HTTP GET requests to /smsa/view_marks.php without authentication headers

SIEM Query:

source="web_server" AND url="/smsa/view_marks.php" AND NOT (user!="" OR auth_success="true")

🔗 References

📤 Share & Export