First published: Fri Dec 29 2023(Updated: )
A vulnerability was found in code-projects Client Details System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/regester.php. The manipulation of the argument fname/lname/email/contact leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249146 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7143 has been rated as problematic.
CVE-2023-7143 affects the functionality of the /admin/regester.php file, allowing cross site scripting through manipulated input.
The vulnerability in CVE-2023-7143 is triggered by manipulating the fname, lname, email, and contact arguments.
Mitigation of CVE-2023-7143 can be addressed by properly sanitizing user inputs in the affected PHP script.
As of now, there is no official patch announced for CVE-2023-7143.