A stored cross-site scripting (XSS) vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary JavaScript code by including malicious payloads into “remarks”, “borrower_name”, “faculty_department” parameters in /classes/Master.php?f=save_record.
References
Link | Resource |
---|---|
https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md | Exploit Third Party Advisory |
https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md | Exploit Third Party Advisory |
Configurations
History
11 Apr 2025, 14:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23 computer Laboratory Management System
Oretnom23 |
Information
Published : 2024-04-09 13:15
Updated : 2025-04-11 14:56
NVD link : CVE-2024-31544
Mitre link : CVE-2024-31544
CVE.ORG link : CVE-2024-31544
JSON object : View
Products Affected
oretnom23
- computer_laboratory_management_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')