SourceCodester Simple Food Ordering System 1.0 /login.php email/password cross site scripting

A vulnerability, which was classified as problematic, was found in SourceCodester Simple Food Ordering System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password with the input "><ScRiPt>alert(1)</sCrIpT> leads to cross site scripting. The CWE definition for the vulnerability is CWE-79. The weakness was released 08/05/2022. It is possible to read the advisory at github.com. This vulnerability is uniquely identified as CVE-2022-2683. It is possible to initiate the attack remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The pricing for an exploit might be around USD $0-$5k at the moment. The attack technique deployed by this issue is T1059.007 according to MITRE ATT&CK. It is declared as proof-of-concept. The exploit is shared for download at github.com. We expect the 0-day to have been worth approximately $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

125

Field

source_cve_nvd_summary1
source_cve_assigned1
software_input_value1
exploit_price_0day1
vulnerability_cvss3_meta_tempscore1

Commit Conf

90%30
50%11
70%2
100%1

Approve Conf

90%30
80%11
70%2
100%1
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1292200308/30/2022VulD...cve_nvd_summaryA vulnerability, which was classified as problematic, was found in SourceCodester Simple Food Ordering System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password with the input ">alert(1) leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205671.cve.mitre.org08/30/2022accepted
70
1292200208/30/2022VulD...cve_assigned1659650400 (08/05/2022)cve.mitre.org08/30/2022accepted
70
1282451308/05/2022VulD...input_value"><ScRiPt>alert(1)</sCrIpT>08/05/2022accepted
100
1282451208/05/2022VulD...price_0day$0-$5ksee exploit price documentation08/05/2022accepted
90
1282451108/05/2022VulD...cvss3_meta_tempscore3.2see CVSS documentation08/05/2022accepted
90
1282451008/05/2022VulD...cvss3_meta_basescore3.5see CVSS documentation08/05/2022accepted
90
1282450908/05/2022VulD...cvss3_vuldb_tempscore3.2see CVSS documentation08/05/2022accepted
90
1282450808/05/2022VulD...cvss3_vuldb_basescore3.5see CVSS documentation08/05/2022accepted
90
1282450708/05/2022VulD...cvss2_vuldb_tempscore3.4see CVSS documentation08/05/2022accepted
90
1282450608/05/2022VulD...cvss2_vuldb_basescore4.0see CVSS documentation08/05/2022accepted
90
1282450508/05/2022VulD...cvss3_vuldb_rlXderived from historical data08/05/2022accepted
80
1282450408/05/2022VulD...cvss3_vuldb_prLderived from historical data08/05/2022accepted
80
1282450308/05/2022VulD...cvss2_vuldb_rlNDderived from historical data08/05/2022accepted
80
1282450208/05/2022VulD...cvss2_vuldb_auSderived from historical data08/05/2022accepted
80
1282450108/05/2022VulD...cvss2_vuldb_rcURderived from vuldb v3 vector08/05/2022accepted
80
1282450008/05/2022VulD...cvss2_vuldb_ePOCderived from vuldb v3 vector08/05/2022accepted
80
1282449908/05/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector08/05/2022accepted
80
1282449808/05/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector08/05/2022accepted
80
1282449708/05/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector08/05/2022accepted
80
1282449608/05/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector08/05/2022accepted
80

24 more entries are not shown

Might our Artificial Intelligence support you?

Check our Alexa App!