A vulnerability classified as problematic has been found in SourceCodester Online Railway Reservation System 1.0. This affects an unknown part of the file /?page=reserve. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/gurudattch/CVEs/blob/main/Sourcecodster-Online-Railway-Reservation-StoredXSS-in-reservetion.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.278793 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.278793 | Third Party Advisory |
https://vuldb.com/?submit.412842 | Third Party Advisory |
https://www.sourcecodester.com/ | Product |
Configurations
History
01 Oct 2024, 13:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 5.4 |
First Time |
Oretnom23
Oretnom23 railway Reservation System |
|
CPE | cpe:2.3:a:oretnom23:railway_reservation_system:1.0:*:*:*:*:*:*:* | |
References | () https://github.com/gurudattch/CVEs/blob/main/Sourcecodster-Online-Railway-Reservation-StoredXSS-in-reservetion.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.278793 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.278793 - Third Party Advisory | |
References | () https://vuldb.com/?submit.412842 - Third Party Advisory | |
References | () https://www.sourcecodester.com/ - Product |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Sep 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-28 14:15
Updated : 2024-10-01 13:36
NVD link : CVE-2024-9299
Mitre link : CVE-2024-9299
CVE.ORG link : CVE-2024-9299
JSON object : View
Products Affected
oretnom23
- railway_reservation_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')