A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /ajax.php?action=save_establishment. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-273338 is the identifier assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://gist.github.com/topsky979/6fbd27f1942d76f0392d883dfd8fef10 | Exploit |
| https://vuldb.com/?ctiid.273338 | Permissions Required Third Party Advisory |
| https://vuldb.com/?id.273338 | Permissions Required Third Party Advisory |
| https://vuldb.com/?submit.383494 | Third Party Advisory |
Configurations
History
09 Aug 2024, 14:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:* | |
| First Time |
Oretnom23 tracking Monitoring Management System
Oretnom23 |
|
| References | () https://gist.github.com/topsky979/6fbd27f1942d76f0392d883dfd8fef10 - Exploit | |
| References | () https://vuldb.com/?ctiid.273338 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?id.273338 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?submit.383494 - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.1 |
02 Aug 2024, 12:59
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
01 Aug 2024, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-01 17:16
Updated : 2024-08-09 14:23
NVD link : CVE-2024-7359
Mitre link : CVE-2024-7359
CVE.ORG link : CVE-2024-7359
JSON object : View
Products Affected
oretnom23
- tracking_monitoring_management_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
