First published: Mon Jan 22 2024(Updated: )
A vulnerability, which was classified as problematic, was found in CodeAstro Internet Banking System 1.0. This affects an unknown part of the file pages_client_signup.php. The manipulation of the argument Client Full Name with the input <meta http-equiv="refresh" content="0; url=https://vuldb.com" /> leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251697 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Martinmbithi Internet Banking System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0781 is classified as a problematic vulnerability.
CVE-2024-0781 affects the 'pages_client_signup.php' file by manipulating the 'Client Full Name' argument.
CVE-2024-0781 may allow an attacker to execute a cross-site scripting (XSS) attack.
To mitigate CVE-2024-0781, validate and sanitize input on the 'Client Full Name' field.
As of now, there is no official patch available for CVE-2024-0781 for CodeAstro Internet Banking System 1.0.