First published: Wed Dec 01 2021(Updated: )
Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exits in hostel management system 2.1 via the name field in my-profile.php. Chaining to this both vulnerabilities leads to account takeover.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hostel Management System Project Hostel Management System | =2.1 | |
=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this cross-site scripting and cross-site request forgery vulnerability is CVE-2021-43137.
The severity rating of CVE-2021-43137 is high with a value of 8.8.
The affected software is Hostel Management System Project Hostel Management System version 2.1 and PHPGurukul Hostel Management System version 2.1.
The vulnerability can be exploited by submitting malicious input via the name field in my-profile.php, allowing for cross-site scripting and cross-site request forgery attacks.
Yes, there is a known exploit for CVE-2021-43137. You can find more information about it at the following link: Exploit-DB - CVE-2021-43137