First published: Sun Oct 22 2023(Updated: )
A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file pages_reset_pwd.php. The manipulation of the argument email with the input testing%40example.com'%26%25<ScRiPt%20>alert(9860)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243133 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Martinmbithi Internet Banking System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5695 is medium with a CVSS score of 6.1.
The affected software of CVE-2023-5695 is CodeAstro Internet Banking System 1.0.
The CWE category of CVE-2023-5695 is CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
To fix the cross-site scripting vulnerability in pages_reset_pwd.php, sanitize user input and use proper coding practices to prevent the execution of malicious scripts.
You can find more information about CVE-2023-5695 at the following references: [Reference 1](https://vuldb.com/?id.243133), [Reference 2](https://vuldb.com/?ctiid.243133), [Reference 3](https://github.com/E1CHO/cve_hub/blob/main/Internet%20Banking%20System/Internet%20Banking%20System%20-%20vuln%203.pdf).