CVE-2024-4528

A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /Admin/user-record.php. The manipulation of the argument txtfullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263131.
References
Link Resource
https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.263131 Permissions Required VDB Entry
https://vuldb.com/?id.263131 Third Party Advisory VDB Entry
https://vuldb.com/?submit.329780 Third Party Advisory VDB Entry
https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.263131 Permissions Required VDB Entry
https://vuldb.com/?id.263131 Third Party Advisory VDB Entry
https://vuldb.com/?submit.329780 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:fast5:prison_management_system:1.0:*:*:*:*:*:*:*

History

10 Feb 2025, 16:09

Type Values Removed Values Added
References () https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md - () https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.263131 - () https://vuldb.com/?ctiid.263131 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.263131 - () https://vuldb.com/?id.263131 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.329780 - () https://vuldb.com/?submit.329780 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:fast5:prison_management_system:1.0:*:*:*:*:*:*:*
First Time Fast5 prison Management System
Fast5

21 Nov 2024, 09:43

Type Values Removed Values Added
References () https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md - () https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md -
References () https://vuldb.com/?ctiid.263131 - () https://vuldb.com/?ctiid.263131 -
References () https://vuldb.com/?id.263131 - () https://vuldb.com/?id.263131 -
References () https://vuldb.com/?submit.329780 - () https://vuldb.com/?submit.329780 -

14 May 2024, 15:44

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en SourceCodester Prison Management System 1.0. Ha sido declarada problemática. Una función desconocida del archivo /Admin/user-record.php es afectada por esta vulnerabilidad. La manipulación del argumento txtfullname conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-263131.

06 May 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-06 07:15

Updated : 2025-02-10 16:09


NVD link : CVE-2024-4528

Mitre link : CVE-2024-4528

CVE.ORG link : CVE-2024-4528


JSON object : View

Products Affected

fast5

  • prison_management_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')