ghsa-6962-3p6c-p6p2
Vulnerability from github
Published
2023-09-09 09:30
Modified
2024-02-29 03:32
Severity
Details

A vulnerability classified as problematic has been found in SourceCodester Simple Book Catalog App 1.0. Affected is an unknown function of the component Update Book Form. The manipulation of the argument book_title/book_author leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239256.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2023-4847"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2023-09-09T08:15:07Z",
    "severity": "MODERATE"
  },
  "details": "A vulnerability classified as problematic has been found in SourceCodester Simple Book Catalog App 1.0. Affected is an unknown function of the component Update Book Form. The manipulation of the argument book_title/book_author leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239256.",
  "id": "GHSA-6962-3p6c-p6p2",
  "modified": "2024-02-29T03:32:16Z",
  "published": "2023-09-09T09:30:12Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4847"
    },
    {
      "type": "WEB",
      "url": "https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities"
    },
    {
      "type": "WEB",
      "url": "https://vuldb.com/?ctiid.239256"
    },
    {
      "type": "WEB",
      "url": "https://vuldb.com/?id.239256"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...