A vulnerability classified as problematic has been found in Fast Food Ordering System 1.0. Affected is the file Master.php of the Master List. The manipulation of the argument Description with the input foo "><img src="" onerror="alert(document.cookie)"> leads to cross site scripting. It is possible to launch the attack remotely but it requires authentication. Exploit details have been disclosed to the public.
References
Link | Resource |
---|---|
https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6 | Exploit Third Party Advisory |
https://vuldb.com/?id.201276 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-07 05:15
Updated : 2022-06-14 09:15
NVD link : CVE-2022-1991
Mitre link : CVE-2022-1991
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
fast_food_ordering_system_project
- fast_food_ordering_system