A vulnerability was found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument Name/Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions different parameters to be affected which do not correlate with the screenshots of a successful attack.
History

Wed, 30 Oct 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds simple Web-based Chat Application
CPEs cpe:2.3:a:projectworlds:simple_web-based_chat_application:1.0:*:*:*:*:*:*:*
Vendors & Products Projectworlds simple Web-based Chat Application

Mon, 28 Oct 2024 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds
Projectworlds simple Web Based Chat Application
CPEs cpe:2.3:a:projectworlds:simple_web_based_chat_application:*:*:*:*:*:*:*:*
Vendors & Products Projectworlds
Projectworlds simple Web Based Chat Application
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Oct 2024 00:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument Name/Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions different parameters to be affected which do not correlate with the screenshots of a successful attack.
Title Project Worlds Simple Web-Based Chat Application index.php cross site scripting
Weaknesses CWE-79
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-28T00:00:09.444Z

Updated: 2024-10-28T13:03:15.189Z

Reserved: 2024-10-27T07:14:19.320Z

Link: CVE-2024-10433

cve-icon Vulnrichment

Updated: 2024-10-28T13:03:09.812Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-28T00:15:03.370

Modified: 2024-10-30T18:31:49.533

Link: CVE-2024-10433

cve-icon Redhat

No data.