CVE-2024-41243
📋 TL;DR
An unauthenticated attacker can access student marks data through the /smsa/view_marks.php endpoint in Kashipara Responsive School Management System. This affects all installations of version 3.2.0 that are exposed to network access. The vulnerability allows unauthorized viewing of sensitive academic information.
💻 Affected Systems
- Kashipara Responsive School Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Mass exfiltration of all student academic records, leading to privacy violations, academic fraud, or blackmail opportunities.
Likely Case
Unauthorized viewing of student marks by external actors, compromising student privacy and academic integrity.
If Mitigated
Limited exposure if system is behind proper authentication controls or network segmentation.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoint with no authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Check vendor website for updated version
2. Replace vulnerable view_marks.php file
3. Implement proper authentication checks
🔧 Temporary Workarounds
Access Control Implementation
allAdd authentication checks to view_marks.php file
Edit /smsa/view_marks.php to include session validation and user role checks
Web Server Restriction
allBlock access to vulnerable endpoint at web server level
# Apache: <Location /smsa/view_marks.php> Require valid-user </Location>
# Nginx: location /smsa/view_marks.php { deny all; }
🧯 If You Can't Patch
- Place system behind VPN or network segmentation
- Implement WAF rules to block access to /smsa/view_marks.php
🔍 How to Verify
Check if Vulnerable:
Attempt to access http://[target]/smsa/view_marks.php without authentication. If marks data is returned, system is vulnerable.
Check Version:
Check system documentation or admin panel for version information
Verify Fix Applied:
Attempt same access after fix - should receive authentication error or access denied.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to /smsa/view_marks.php
- Multiple failed authentication attempts followed by successful marks access
Network Indicators:
- HTTP GET requests to /smsa/view_marks.php without authentication headers
SIEM Query:
source="web_server" AND url="/smsa/view_marks.php" AND NOT (user!="" OR auth_success="true")