First published: Mon Sep 25 2023(Updated: )
Cross Site Scripting vulnerability in Service Provider Management System v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the firstname, middlename and lastname parameters in the /php-spms/admin/?page=user endpoint.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Service Provider Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43456 is medium with a CVSS score of 5.4.
CVE-2023-43456 allows a remote attacker to execute arbitrary code and obtain sensitive information in Service Provider Management System v1.0.
To fix the cross-site scripting vulnerability CVE-2023-43456 in Service Provider Management System v1.0, it is recommended to apply the latest patch or update provided by the software vendor.
The Common Weakness Enumeration (CWE) ID for CVE-2023-43456 is CWE-79.
You can find more information about CVE-2023-43456 at the following references: [link1](https://samh4cks.github.io/posts/cve-2023-43456/), [link2](https://www.sourcecodester.com/php/16501/service-provider-management-system-using-php-and-mysql-source-code-free-download.html), [link3](https://www.sourcecodester.com/users/tips23).