First published: Fri Jan 26 2024(Updated: )
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/unitofmeasurementmodify.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Ajaysharma Cups Easy | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23871 has been classified as a medium severity vulnerability due to its potential for exploitation through Cross-Site Scripting.
To fix CVE-2024-23871, update Cups Easy to the latest version that addresses this vulnerability and ensure proper input encoding.
CVE-2024-23871 allows an attacker to execute malicious scripts in the context of affected users, compromising user data and session integrity.
CVE-2024-23871 occurs in the /cupseasylive/unitofmeasurementmodify.php component within Cups Easy, specifically affecting the description parameter.
CVE-2024-23871 affects users running Cups Easy version 1.0, as it allows for user-controlled input exploitation.