First published: Fri Jul 28 2023(Updated: )
Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the emial parameter of admin-profile.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rail Pass Management System Project Rail Pass Management System | =1.0 | |
PHPGurukul Rail Pass Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31935 is classified as a Cross Site Scripting (XSS) vulnerability which is considered high risk due to its potential for data exposure.
To fix CVE-2023-31935, validate and sanitize all user inputs, especially the 'email' parameter in admin-profile.php.
CVE-2023-31935 affects version 1.0 of the Rail Pass Management System.
CVE-2023-31935 can facilitate attacks that enable remote attackers to execute malicious scripts in the context of a user's browser.
Any user of the Rail Pass Management System v.1.0, particularly administrators, may be affected by CVE-2023-31935.