A vulnerability was found in SourceCodester Online Railway Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/. The manipulation of the argument page with the input trains/schedules/system_info leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Online-Railway-Reservation-PrivEsc.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.278791 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.278791 | Third Party Advisory |
https://vuldb.com/?submit.412500 | Third Party Advisory |
https://www.sourcecodester.com/ | Product |
Configurations
History
01 Oct 2024, 13:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Online-Railway-Reservation-PrivEsc.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.278791 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.278791 - Third Party Advisory | |
References | () https://vuldb.com/?submit.412500 - Third Party Advisory | |
References | () https://www.sourcecodester.com/ - Product | |
CWE | CWE-862 | |
CPE | cpe:2.3:a:oretnom23:railway_reservation_system:1.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23
Oretnom23 railway Reservation System |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Sep 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-28 12:15
Updated : 2024-10-01 13:39
NVD link : CVE-2024-9297
Mitre link : CVE-2024-9297
CVE.ORG link : CVE-2024-9297
JSON object : View
Products Affected
oretnom23
- railway_reservation_system