First published: Fri Jul 28 2023(Updated: )
Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the adminname parameter of admin-profile.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rail Pass Management System Project Rail Pass Management System | =1.0 | |
PHPGurukul Rail Pass Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-31934 is medium with a score of 4.8.
A remote attacker can exploit CVE-2023-31934 by sending malicious input through the adminname parameter of admin-profile.php in Rail Pass Management System v.1.0.
Yes, an attacker can obtain sensitive information by exploiting CVE-2023-31934 in Rail Pass Management System v.1.0.
We recommend updating Rail Pass Management System to a version that has addressed the Cross Site Scripting vulnerability reported in CVE-2023-31934.
You can find more information about CVE-2023-31934 in the BugReport repository on GitHub: https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md