VYPR
Critical severityNVD Advisory· Published Feb 22, 2022· Updated Aug 4, 2024

CVE-2021-44567

CVE-2021-44567

Description

An unauthenticated SQL Injection vulnerability exists in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated SQL injection in RosarioSIS before 7.6.1 via unsanitized $_POST['votes'] keys in PortalPollsVote function.

Vulnerability

The vulnerability is an unauthenticated SQL injection in RosarioSIS versions before 7.6.1. It resides in the PortalPollsVote() function within ProgramFunctions/PortalPollsNotes.fnc.php. The function directly concatenates the $poll_id parameter into an SQL query without sanitization. Although RosarioSIS sanitizes $_REQUEST values via DBEscapeString, it does not sanitize $_GET and $_POST arrays directly, and the array_rwalk function only sanitizes values, not keys. The votes parameter in $_POST is used as an array where keys become $poll_id, leading to injection via unsanitized keys. [2]

Exploitation

An unauthenticated attacker can send a crafted HTTP POST request to the vulnerable endpoint. The request must include a votes array parameter with a malicious key containing SQL injection payload. The attacker does not need any authentication or special privileges. The injection occurs when the key is directly inserted into the query string. [2]

Impact

Successful exploitation allows an attacker to execute arbitrary SQL commands on the database. This can lead to unauthorized access, data exfiltration, modification, or deletion of database contents. The attacker gains the ability to read sensitive information, potentially including user credentials and other confidential data. [2]

Mitigation

The issue is fixed in RosarioSIS version 7.6.1, released on or before February 22, 2022. The fix involved moving the poll vote code to use sanitized $_REQUEST instead of $_POST and adding sanitization of array keys in the array_rwalk function. [3][4] Users should upgrade to version 7.6.1 or later. No workarounds are documented; upgrading is the recommended action.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
francoisjacquet/rosariosisPackagist
< 7.6.17.6.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.