A vulnerability classified as problematic was found in SourceCodester Online Railway Reservation System 1.0. This vulnerability affects unknown code of the file contact_us.php of the component Message Us Form. The manipulation of the argument fullname/email/message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/gurudattch/CVEs/blob/main/Sourcecoderster-Online-Railway-Reservation-System-stored-xss.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.278794 | Permissions Required |
https://vuldb.com/?id.278794 | Third Party Advisory |
https://vuldb.com/?submit.412476 | Third Party Advisory |
https://www.sourcecodester.com/ | Product |
Configurations
History
01 Oct 2024, 13:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gurudattch/CVEs/blob/main/Sourcecoderster-Online-Railway-Reservation-System-stored-xss.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.278794 - Permissions Required | |
References | () https://vuldb.com/?id.278794 - Third Party Advisory | |
References | () https://vuldb.com/?submit.412476 - Third Party Advisory | |
References | () https://www.sourcecodester.com/ - Product | |
First Time |
Oretnom23
Oretnom23 railway Reservation System |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 6.1 |
CPE | cpe:2.3:a:oretnom23:railway_reservation_system:1.0:*:*:*:*:*:*:* |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Sep 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-28 15:15
Updated : 2024-10-01 13:34
NVD link : CVE-2024-9300
Mitre link : CVE-2024-9300
CVE.ORG link : CVE-2024-9300
JSON object : View
Products Affected
oretnom23
- railway_reservation_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')