CVE-2024-7367

A vulnerability, which was classified as problematic, was found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=save_user. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273351.
References
Link Resource
https://gist.github.com/topsky979/03ae83fd32a94c85f910c8e3a85fa056 Exploit
https://vuldb.com/?ctiid.273351 Permissions Required Third Party Advisory
https://vuldb.com/?id.273351 Third Party Advisory
https://vuldb.com/?submit.383515 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-08-01 21:16

Updated : 2024-08-09 11:27


NVD link : CVE-2024-7367

Mitre link : CVE-2024-7367

CVE.ORG link : CVE-2024-7367


JSON object : View

Products Affected

oretnom23

  • simple_realtime_quiz_system
CWE
CWE-352

Cross-Site Request Forgery (CSRF)