First published: Sun Nov 26 2023(Updated: )
A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6301 is medium with a CVSS score of 6.1.
CVE-2023-6301 affects SourceCodester Best Courier Management System 1.0.
CVE-2023-6301 is classified as a cross-site scripting (XSS) vulnerability.
The vulnerability in CVE-2023-6301 can be exploited by manipulating the 'id' parameter in the 'parcel_list.php' file.
Please refer to the official vendor for a fix or mitigation for CVE-2023-6301.