First published: Wed Jul 31 2024(Updated: )
A vulnerability has been found in SourceCodester Establishment Billing Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/ajax.php?action=save_settings. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273154 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Establishment Billing Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7285 is classified as a problematic vulnerability affecting the SourceCodester Establishment Billing Management System.
CVE-2024-7285 leads to cross-site scripting through the manipulation of the 'name' argument in the /admin/ajax.php?action=save_settings file.
The potential impact of CVE-2024-7285 includes the possibility of executing malicious scripts in the context of the affected user's session.
To address CVE-2024-7285, you should implement input validation to sanitize the 'name' argument in the relevant PHP file.
As of now, there is no specific patch announced for CVE-2024-7285, so users should apply recommended security practices to mitigate the risk.