A vulnerability classified as problematic was found in SourceCodester Online Railway Reservation System 1.0. This vulnerability affects unknown code of the file contact_us.php of the component Message Us Form. The manipulation of the argument fullname/email/message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/gurudattch/CVEs/blob/main/Sourcecoderster-Online-Railway-Reservation-System-stored-xss.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.278794 | Permissions Required |
| https://vuldb.com/?id.278794 | Third Party Advisory |
| https://vuldb.com/?submit.412476 | Third Party Advisory |
| https://www.sourcecodester.com/ | Product |
Configurations
History
01 Oct 2024, 13:34
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 6.1 |
| First Time |
Oretnom23
Oretnom23 railway Reservation System |
|
| CPE | cpe:2.3:a:oretnom23:railway_reservation_system:1.0:*:*:*:*:*:*:* | |
| References | () https://github.com/gurudattch/CVEs/blob/main/Sourcecoderster-Online-Railway-Reservation-System-stored-xss.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.278794 - Permissions Required | |
| References | () https://vuldb.com/?id.278794 - Third Party Advisory | |
| References | () https://vuldb.com/?submit.412476 - Third Party Advisory | |
| References | () https://www.sourcecodester.com/ - Product |
30 Sep 2024, 12:45
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
28 Sep 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-09-28 15:15
Updated : 2024-10-01 13:34
NVD link : CVE-2024-9300
Mitre link : CVE-2024-9300
CVE.ORG link : CVE-2024-9300
JSON object : View
Products Affected
oretnom23
- railway_reservation_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
