CVE-2021-44567
Description
An unauthenticated SQL Injection vulnerability exists in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated SQL injection in RosarioSIS before 7.6.1 via unsanitized $_POST['votes'] keys in PortalPollsVote function.
Vulnerability
The vulnerability is an unauthenticated SQL injection in RosarioSIS versions before 7.6.1. It resides in the PortalPollsVote() function within ProgramFunctions/PortalPollsNotes.fnc.php. The function directly concatenates the $poll_id parameter into an SQL query without sanitization. Although RosarioSIS sanitizes $_REQUEST values via DBEscapeString, it does not sanitize $_GET and $_POST arrays directly, and the array_rwalk function only sanitizes values, not keys. The votes parameter in $_POST is used as an array where keys become $poll_id, leading to injection via unsanitized keys. [2]
Exploitation
An unauthenticated attacker can send a crafted HTTP POST request to the vulnerable endpoint. The request must include a votes array parameter with a malicious key containing SQL injection payload. The attacker does not need any authentication or special privileges. The injection occurs when the key is directly inserted into the query string. [2]
Impact
Successful exploitation allows an attacker to execute arbitrary SQL commands on the database. This can lead to unauthorized access, data exfiltration, modification, or deletion of database contents. The attacker gains the ability to read sensitive information, potentially including user credentials and other confidential data. [2]
Mitigation
The issue is fixed in RosarioSIS version 7.6.1, released on or before February 22, 2022. The fix involved moving the poll vote code to use sanitized $_REQUEST instead of $_POST and adding sanitization of array keys in the array_rwalk function. [3][4] Users should upgrade to version 7.6.1 or later. No workarounds are documented; upgrading is the recommended action.
- Unauthenticated SQL Injection in /ProgramFunctions/PortalPollsNotes.fnc.php Due to Insufficient Sanitization (#308) · Issues · François Jacquet / rosariosis · GitLab
- Fix #308 Unauthenticated SQL injection. Use sanitized `$_REQUEST` + Move... (e001430a) · Commits · François Jacquet / rosariosis · GitLab
- Fix #308 security issue sanitize key. Pass array keys through function (519af055) · Commits · François Jacquet / rosariosis · GitLab
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
francoisjacquet/rosariosisPackagist | < 7.6.1 | 7.6.1 |
Affected products
2- RosarioSIS/RosarioSISdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-82rr-mq4r-p4r3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-44567ghsaADVISORY
- gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.mdghsax_refsource_MISCWEB
- gitlab.com/francoisjacquet/rosariosis/-/commit/519af055a4fdc1362657d75bca76f9c95a081eaaghsax_refsource_MISCWEB
- gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016ghsax_refsource_MISCWEB
- gitlab.com/francoisjacquet/rosariosis/-/issues/308ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.