A vulnerability, which was classified as problematic, was found in SourceCodester Simple Parking Management System 1.0. This affects an unknown part of the file /ci_spms/admin/category. The manipulation of the argument vehicle_type with the input "><script>alert("XSS")</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md | Exploit Third Party Advisory |
https://vuldb.com/?id.203421 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-07-12 10:15
Updated : 2022-07-15 19:30
NVD link : CVE-2022-2364
Mitre link : CVE-2022-2364
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
simple_parking_management_system_project
- simple_parking_management_system