A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.246123 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.246123 | Permissions Required Third Party Advisory | 
| https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.246123 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.246123 | Permissions Required Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2023-11-26 23:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6297
Mitre link : CVE-2023-6297
CVE.ORG link : CVE-2023-6297
JSON object : View
Products Affected
                phpgurukul
- nipah_virus_testing_management_system
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
