CVE-2023-38883

A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'ajax' parameter in 'ParentLookup.php'.
Configurations

Configuration 1 (hide)

cpe:2.3:a:os4ed:opensis:9.0:*:*:*:community:*:*:*

History

30 Nov 2023, 14:21

Type Values Removed Values Added
References () https://www.os4ed.com/ - () https://www.os4ed.com/ - Product
References () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38883 - () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38883 - Vendor Advisory
References () https://github.com/OS4ED/openSIS-Classic - () https://github.com/OS4ED/openSIS-Classic - Product, Release Notes
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:os4ed:opensis:9.0:*:*:*:community:*:*:*
First Time Os4ed opensis
Os4ed

20 Nov 2023, 19:18

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-20 19:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-38883

Mitre link : CVE-2023-38883

CVE.ORG link : CVE-2023-38883


JSON object : View

Products Affected

os4ed

  • opensis
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')