CVE-2023-1795

A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/products/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(666)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224747.
References
Link Resource
https://github.com/FinleyTang/bug_report/blob/main/XSS-1.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.224747 Permissions Required Third Party Advisory
https://vuldb.com/?id.224747 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gadget_works_online_ordering_system_project:gadget_works_online_ordering_system:1.0:*:*:*:*:*:*:*

History

29 Feb 2024, 01:37

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-02 09:15

Updated : 2024-05-17 02:18


NVD link : CVE-2023-1795

Mitre link : CVE-2023-1795

CVE.ORG link : CVE-2023-1795


JSON object : View

Products Affected

gadget_works_online_ordering_system_project

  • gadget_works_online_ordering_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')