CVE-2024-2570

A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been classified as critical. This affects an unknown part of the file /edit-task.php. The manipulation leads to execution after redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257073 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*

History

20 Feb 2025, 18:13

Type Values Removed Values Added
CPE cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*
First Time Oretnom23 employee Task Management System
Oretnom23
References () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md - () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md - Broken Link
References () https://vuldb.com/?ctiid.257073 - () https://vuldb.com/?ctiid.257073 - Permissions Required
References () https://vuldb.com/?id.257073 - () https://vuldb.com/?id.257073 - Third Party Advisory

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md - () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md -
References () https://vuldb.com/?ctiid.257073 - () https://vuldb.com/?ctiid.257073 -
References () https://vuldb.com/?id.257073 - () https://vuldb.com/?id.257073 -

21 Mar 2024, 02:52

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en SourceCodester Employee Task Management System 1.0. Ha sido clasificada como crítica. Esto afecta a una parte desconocida del archivo /edit-task.php. La manipulación conduce a la ejecución después de la redirección. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-257073.

18 Mar 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 00:15

Updated : 2025-02-20 18:13


NVD link : CVE-2024-2570

Mitre link : CVE-2024-2570

CVE.ORG link : CVE-2024-2570


JSON object : View

Products Affected

oretnom23

  • employee_task_management_system
CWE
CWE-698

Execution After Redirect (EAR)