CVE-2024-2573

A vulnerability classified as critical has been found in SourceCodester Employee Task Management System 1.0. Affected is an unknown function of the file /task-info.php. The manipulation leads to execution after redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257076.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*

History

20 Feb 2025, 18:12

Type Values Removed Values Added
References () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md - () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md - Broken Link
References () https://vuldb.com/?ctiid.257076 - () https://vuldb.com/?ctiid.257076 - Permissions Required
References () https://vuldb.com/?id.257076 - () https://vuldb.com/?id.257076 - Permissions Required
First Time Oretnom23 employee Task Management System
Oretnom23
CPE cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md - () https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md -
References () https://vuldb.com/?ctiid.257076 - () https://vuldb.com/?ctiid.257076 -
References () https://vuldb.com/?id.257076 - () https://vuldb.com/?id.257076 -

21 Mar 2024, 02:52

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en SourceCodester Employee Task Management System 1.0 y clasificada como crítica. Una función desconocida del archivo /task-info.php es afectada por esta vulnerabilidad. La manipulación conduce a la ejecución después de la redirección. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257076.

18 Mar 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 01:15

Updated : 2025-02-20 18:12


NVD link : CVE-2024-2573

Mitre link : CVE-2024-2573

CVE.ORG link : CVE-2024-2573


JSON object : View

Products Affected

oretnom23

  • employee_task_management_system
CWE
CWE-698

Execution After Redirect (EAR)