Required CVE Record Information
Description
A vulnerability, which was classified as problematic, has been found in SourceCodester Best House Rental Management System 1.0. This issue affects some unknown processing of the file /rental/ajax.php?action=save_tenant. The manipulation of the argument lastname/firstname/middlename leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
CVSS 4 Total
Score | Severity | Version | Vector String |
---|---|---|---|
5.3 | MEDIUM | 4.0 | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
3.5 | LOW | 3.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N |
3.5 | LOW | 3.0 | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N |
4.0 | — | 2.0 | AV:N/AC:L/Au:S/C:N/I:P/A:N |
Credits
- Yasser Alshammari finder
- YasserREED (VulDB User) reporter
References 5 Total
- vuldb.com: VDB-286139 | SourceCodester Best House Rental Management System ajax.php cross site scripting vdb-entrytechnical-description
- vuldb.com: VDB-286139 | CTI Indicators (IOB, IOC, TTP, IOA) signaturepermissions-required
- vuldb.com: Submit #449683 | sourcecodester Best house rental management system project in php v1.0 Stored Cross-Site Scripting (XSS) third-party-advisory
- https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Stored%20Cross-Site%20Scripting%20(XSS).md exploit
- https://www.sourcecodester.com/ product