Submit #299774: SOURCECODESTER Employee Task Management System 1.0 Execution After Redirectinfo

TitleSOURCECODESTER Employee Task Management System 1.0 Execution After Redirect
DescriptionThe Employee Task Management System is vulnerable to an Execution After Redirect (EAR) issue in `/task-info.php`, allowing unauthorized page access by modifying HTTP response statuses, thus bypassing security checks. This flaw underlines the necessity for effective session validation and secure redirect implementations to protect against unauthorized access.
Source⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md
Usernochizplz (ID 64302)
Submission2024-03-16 18:06 (2 months ago)
Moderation2024-03-17 09:26 (15 hours later)
StatusPrzyjęty
VulDB Entry257076

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!