Required CVE Record Information
Description
A vulnerability has been found in SourceCodester/code-projects Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS 4 Total
Score | Severity | Version | Vector String |
---|---|---|---|
5.1 | MEDIUM | 4.0 | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
3.5 | LOW | 3.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N |
3.5 | LOW | 3.0 | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N |
4.0 | — | 2.0 | AV:N/AC:L/Au:S/C:N/I:P/A:N |
Product Status
Learn moreVersions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Credits
- jidle (VulDB User) reporter
References 4 Total
- vuldb.com: VDB-221755 | SourceCodester/code-projects Online Boat Reservation System POST Parameter login.php cross site scripting vdb-entrytechnical-description
- vuldb.com: VDB-221755 | CTI Indicators (IOB, IOC, TTP, IOA) signaturepermissions-required
- vuldb.com: Submit #94112 | Online Boat Reservation System v1.0 /boat/login.php post parameter 'un' exists xss vulnerability third-party-advisory
- https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected broken-linkexploit
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 3 Total
- https://vuldb.com/?id.221755 vdb-entrytechnical-descriptionx_transferred
- https://vuldb.com/?ctiid.221755 signaturepermissions-requiredx_transferred
- https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected exploitx_transferred