A vulnerability, which was classified as problematic, was found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function. The manipulation of the argument page with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246126 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/BigTiger2020/2023/blob/main/best-courier-management-system/best-courier-management-system%20-%20reflected%20xss.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.246126 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.246126 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-11-27 00:15
Updated : 2024-05-17 02:33
NVD link : CVE-2023-6300
Mitre link : CVE-2023-6300
CVE.ORG link : CVE-2023-6300
JSON object : View
Products Affected
mayurik
- best_courier_management_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')