A vulnerability, which was classified as problematic, was found in CodeAstro Internet Banking System 1.0. This affects an unknown part of the file pages_client_signup.php. The manipulation of the argument Client Full Name with the input <meta http-equiv="refresh" content="0; url=https://vuldb.com" /> leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251697 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://drive.google.com/drive/folders/1f61RXqelSDY0T92aLjmb8BhgAHt_eeUS | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.251697 | Third Party Advisory |
https://vuldb.com/?id.251697 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2024-01-22T16:00:07.573Z
Updated: 2024-01-22T16:00:07.573Z
Reserved: 2024-01-22T11:05:30.097Z
Link: CVE-2024-0781
JSON object: View
NVD Information
Status : Modified
Published: 2024-01-22T16:15:08.577
Modified: 2024-05-17T02:34:57.813
Link: CVE-2024-0781
JSON object: View
Redhat Information
No data.
CWE