PHPGurukul BP Monitoring Management System 1.0 Add New Family Member add-family-member.php Member Name cross site scripting

Une vulnérabilité a été trouvé dans PHPGurukul BP Monitoring Management System 1.0 et classée problématique. Ceci affecte une fonction inconnue du fichier add-family-member.php du composant Add New Family Member Handler. A cause de la manipulation du paramètre Member Name avec une valeur d'entrée inconnue mène à une vulnérabilité de classe cross site scripting. La notice d'information est disponible en téléchargement sur github.com. Cette vulnérabilité a été nommée CVE-2023-1948. L'attaque peut être initialisée à distance. Des details techniques sont connus. Il est déclaré comme proof-of-concept. L'exploit est disponible au téléchargment sur github.com. Une solution envisageable a été publiée avant et non après après la publication de la vulnérabilité.

Domaine08/04/2023 08:1726/04/2023 08:5926/04/2023 09:00
vendorPHPGurukulPHPGurukulPHPGurukul
nameBP Monitoring Management SystemBP Monitoring Management SystemBP Monitoring Management System
version1.01.01.0
componentAdd New Family Member HandlerAdd New Family Member HandlerAdd New Family Member Handler
fileadd-family-member.phpadd-family-member.phpadd-family-member.php
argumentMember NameMember NameMember Name
cwe79 (cross site scripting)79 (cross site scripting)79 (cross site scripting)
risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://github.com/vsdwef/BP-Monitoring-Management-System/blob/main/XSS_English.pdfhttps://github.com/vsdwef/BP-Monitoring-Management-System/blob/main/XSS_English.pdfhttps://github.com/vsdwef/BP-Monitoring-Management-System/blob/main/XSS_English.pdf
availability111
publicity111
urlhttps://github.com/vsdwef/BP-Monitoring-Management-System/blob/main/XSS_English.pdfhttps://github.com/vsdwef/BP-Monitoring-Management-System/blob/main/XSS_English.pdfhttps://github.com/vsdwef/BP-Monitoring-Management-System/blob/main/XSS_English.pdf
cveCVE-2023-1948CVE-2023-1948CVE-2023-1948
responsibleVulDBVulDBVulDB
cvss3_meta_basescore3.53.54.4
cvss3_meta_tempscore3.23.24.3
price_0day$0-$5k$0-$5k$0-$5k
date1680904800 (08/04/2023)1680904800 (08/04/2023)1680904800 (08/04/2023)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore4.04.04.0
cvss2_vuldb_tempscore3.43.43.4
cvss3_vuldb_basescore3.53.53.5
cvss3_vuldb_tempscore3.23.23.2
cve_assigned1680904800 (08/04/2023)1680904800 (08/04/2023)
cve_nvd_summaryA vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335.A vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciN
cvss2_nvd_iiP
cvss2_nvd_aiN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss2_nvd_basescore4.0
cvss3_nvd_basescore6.1
cvss3_cna_basescore3.5

Interested in the pricing of exploits?

See the underground prices here!