A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php of the component POST Parameter Handler. The manipulation of the argument value with the input 1><script>alert(666)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226274 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/1406213367/bug_report/blob/main/XSS-1.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.226274 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.226274 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-04-18T14:00:05.924Z
Updated: 2023-10-22T14:30:34.999Z
Reserved: 2023-04-18T10:56:14.857Z
Link: CVE-2023-2153
JSON object: View
NVD Information
Status : Modified
Published: 2023-04-18T14:15:07.503
Modified: 2024-05-17T02:22:43.647
Link: CVE-2023-2153
JSON object: View
Redhat Information
No data.
CWE