First published: Thu Aug 01 2024(Updated: )
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=save_user. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273351.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Realtime Quiz System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7367 is classified as a problematic vulnerability.
To fix CVE-2024-7367, developers should implement anti-CSRF tokens in the /ajax.php?action=save_user endpoint.
CVE-2024-7367 is a cross-site request forgery (CSRF) vulnerability.
CVE-2024-7367 affects SourceCodester Simple Realtime Quiz System version 1.0.
Yes, CVE-2024-7367 can be exploited remotely.