SourceCodester Online Student Admission System Student User Page edit-profile.php cross site scripting

A vulnerability classified as problematic was found in SourceCodester Online Student Admission System. Affected by this vulnerability is an unknown functionality of the file edit-profile.php of the component Student User Page. The manipulation with the input <script>alert(/xss/)</script> leads to cross site scripting. The CWE definition for the vulnerability is CWE-79. The weakness was shared 08/05/2022. The advisory is shared at github.com. This vulnerability is known as CVE-2022-2681. The attack can be launched remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The price for an exploit might be around USD $0-$5k at the moment. MITRE ATT&CK project uses the attack technique T1059.007 for this issue. It is declared as proof-of-concept. It is possible to download the exploit at github.com. We expect the 0-day to have been worth approximately $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

124

Field

source_cve_nvd_summary1
source_cve_assigned1
software_input_value1
exploit_price_0day1
vulnerability_cvss3_meta_tempscore1

Commit Conf

90%29
50%11
70%2
100%1

Approve Conf

90%29
80%11
70%2
100%1
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1292199808/30/2022VulD...cve_nvd_summaryA vulnerability classified as problematic was found in SourceCodester Online Student Admission System. Affected by this vulnerability is an unknown functionality of the file edit-profile.php of the component Student User Page. The manipulation with the input alert(/xss/) leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205669 was assigned to this vulnerability.cve.mitre.org08/30/2022accepted
70
1292199708/30/2022VulD...cve_assigned1659650400 (08/05/2022)cve.mitre.org08/30/2022accepted
70
1282442908/05/2022VulD...input_value<script>alert(/xss/)</script>08/05/2022accepted
100
1282442808/05/2022VulD...price_0day$0-$5ksee exploit price documentation08/05/2022accepted
90
1282442708/05/2022VulD...cvss3_meta_tempscore3.2see CVSS documentation08/05/2022accepted
90
1282442608/05/2022VulD...cvss3_meta_basescore3.5see CVSS documentation08/05/2022accepted
90
1282442508/05/2022VulD...cvss3_vuldb_tempscore3.2see CVSS documentation08/05/2022accepted
90
1282442408/05/2022VulD...cvss3_vuldb_basescore3.5see CVSS documentation08/05/2022accepted
90
1282442308/05/2022VulD...cvss2_vuldb_tempscore3.4see CVSS documentation08/05/2022accepted
90
1282442208/05/2022VulD...cvss2_vuldb_basescore4.0see CVSS documentation08/05/2022accepted
90
1282442108/05/2022VulD...cvss3_vuldb_rlXderived from historical data08/05/2022accepted
80
1282442008/05/2022VulD...cvss3_vuldb_prLderived from historical data08/05/2022accepted
80
1282441908/05/2022VulD...cvss2_vuldb_rlNDderived from historical data08/05/2022accepted
80
1282441808/05/2022VulD...cvss2_vuldb_auSderived from historical data08/05/2022accepted
80
1282441708/05/2022VulD...cvss2_vuldb_rcURderived from vuldb v3 vector08/05/2022accepted
80
1282441608/05/2022VulD...cvss2_vuldb_ePOCderived from vuldb v3 vector08/05/2022accepted
80
1282441508/05/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector08/05/2022accepted
80
1282441408/05/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector08/05/2022accepted
80
1282441308/05/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector08/05/2022accepted
80
1282441208/05/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector08/05/2022accepted
80

23 more entries are not shown

Might our Artificial Intelligence support you?

Check our Alexa App!