A vulnerability was found in SourceCodester Daily Calories Monitoring Tool 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/add-calorie.php. The manipulation of the argument calorie_date/calorie_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/jadu101/CVE/blob/main/SourceCodester_Daily_Calories_Monitoring_Tool_add_calorie_XSS.md | Exploit |
https://vuldb.com/?ctiid.275721 | Permissions Required |
https://vuldb.com/?id.275721 | Permissions Required Third Party Advisory |
https://vuldb.com/?submit.396895 | Exploit Third Party Advisory |
https://www.sourcecodester.com/ | Product |
Configurations
History
26 Aug 2024, 19:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rems
Rems daily Calories Monitoring Tool |
|
CPE | cpe:2.3:a:rems:daily_calories_monitoring_tool:1.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 5.4 |
References | () https://github.com/jadu101/CVE/blob/main/SourceCodester_Daily_Calories_Monitoring_Tool_add_calorie_XSS.md - Exploit | |
References | () https://vuldb.com/?ctiid.275721 - Permissions Required | |
References | () https://vuldb.com/?id.275721 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?submit.396895 - Exploit, Third Party Advisory | |
References | () https://www.sourcecodester.com/ - Product |
26 Aug 2024, 12:47
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Aug 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-25 02:15
Updated : 2024-08-26 19:09
NVD link : CVE-2024-8141
Mitre link : CVE-2024-8141
CVE.ORG link : CVE-2024-8141
JSON object : View
Products Affected
rems
- daily_calories_monitoring_tool
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')