A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/dymanic_table.php. The manipulation of the argument scripts leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dymanic_table.php).md | Exploit Third Party Advisory |
| https://phpgurukul.com/ | Product |
| https://vuldb.com/?ctiid.282923 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.282923 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.436376 | Third Party Advisory VDB Entry |
Configurations
History
05 Nov 2024, 19:57
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Phpgurukul online Shopping Portal
Phpgurukul |
|
| CPE | cpe:2.3:a:phpgurukul:online_shopping_portal:2.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.1 |
| References | () https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dymanic_table.php).md - Exploit, Third Party Advisory | |
| References | () https://phpgurukul.com/ - Product | |
| References | () https://vuldb.com/?ctiid.282923 - Permissions Required, Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?id.282923 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.436376 - Third Party Advisory, VDB Entry |
04 Nov 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-11-04 03:15
Updated : 2024-11-05 19:57
NVD link : CVE-2024-10754
Mitre link : CVE-2024-10754
CVE.ORG link : CVE-2024-10754
JSON object : View
Products Affected
phpgurukul
- online_shopping_portal
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
