A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/products/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(666)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224747.
References
Link | Resource |
---|---|
https://github.com/FinleyTang/bug_report/blob/main/XSS-1.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.224747 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.224747 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Feb 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-02 09:15
Updated : 2024-05-17 02:18
NVD link : CVE-2023-1795
Mitre link : CVE-2023-1795
CVE.ORG link : CVE-2023-1795
JSON object : View
Products Affected
gadget_works_online_ordering_system_project
- gadget_works_online_ordering_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')