A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been declared as problematic. Affected by this vulnerability is the function save_patient of the file patient_side.php. The manipulation of the argument Full Name/Contact/Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269485 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5tda-XBJF513yzag/edit?usp=sharing | Exploit |
https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.269485 | Permissions Required |
https://vuldb.com/?id.269485 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.362873 | Third Party Advisory VDB Entry |
https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5tda-XBJF513yzag/edit?usp=sharing | Exploit |
https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.269485 | Permissions Required |
https://vuldb.com/?id.269485 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.362873 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 09:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 4.3 |
References | () https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5tda-XBJF513yzag/edit?usp=sharing - Exploit | |
References | () https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.269485 - Permissions Required | |
References | () https://vuldb.com/?id.269485 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.362873 - Third Party Advisory, VDB Entry |
06 Sep 2024, 16:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5tda-XBJF513yzag/edit?usp=sharing - Exploit | |
References | () https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.269485 - Permissions Required | |
References | () https://vuldb.com/?id.269485 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.362873 - Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 6.1 |
First Time |
Oretnom23 clinic Queuing System
Oretnom23 |
|
CPE | cpe:2.3:a:oretnom23:clinic_queuing_system:1.0:*:*:*:*:*:*:* |
24 Jun 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-23 22:15
Updated : 2024-11-21 09:49
NVD link : CVE-2024-6273
Mitre link : CVE-2024-6273
CVE.ORG link : CVE-2024-6273
JSON object : View
Products Affected
oretnom23
- clinic_queuing_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')