A vulnerability was found in Project Worlds Student Project Allocation System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin_login.php of the component Admin Login Module. The manipulation of the argument msg with the input test%22%3Cscript%3Ealert(%27Torada%27)%3C/script%3E leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251549 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://torada.notion.site/Reflected-Cross-site-scripting-at-Project-Allocation-System-d94c7c489c2d48efa23b21a90dd0e03f?pvs=4 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.251549 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.251549 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-01-19 18:15
Updated : 2024-05-17 02:34
NVD link : CVE-2024-0726
Mitre link : CVE-2024-0726
CVE.ORG link : CVE-2024-0726
JSON object : View
Products Affected
yugeshverma
- student_project_allocation_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')