A vulnerability classified as problematic was found in SourceCodester Online Railway Reservation System 1.0. This vulnerability affects unknown code of the file contact_us.php of the component Message Us Form. The manipulation of the argument fullname/email/message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/gurudattch/CVEs/blob/main/Sourcecoderster-Online-Railway-Reservation-System-stored-xss.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.278794 | Permissions Required |
https://vuldb.com/?id.278794 | Third Party Advisory |
https://vuldb.com/?submit.412476 | Third Party Advisory |
https://www.sourcecodester.com/ | Product |
Configurations
History
No history.
Information
Published : 2024-09-28 15:15
Updated : 2024-10-01 13:34
NVD link : CVE-2024-9300
Mitre link : CVE-2024-9300
CVE.ORG link : CVE-2024-9300
JSON object : View
Products Affected
oretnom23
- railway_reservation_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')