A vulnerability was found in SourceCodester Task Progress Tracker 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file update-task.php. The manipulation of the argument task_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-48968 A vulnerability was found in SourceCodester Task Progress Tracker 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file update-task.php. The manipulation of the argument task_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 26 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Rems
Rems task Progress Tracker
CPEs cpe:2.3:a:rems:task_progress_tracker:1.0:*:*:*:*:*:*:*
Vendors & Products Rems
Rems task Progress Tracker

Mon, 26 Aug 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester task Progress Tracker
CPEs cpe:2.3:a:sourcecodester:task_progress_tracker:1.0:*:*:*:*:*:*:*
Vendors & Products Sourcecodester
Sourcecodester task Progress Tracker
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 25 Aug 2024 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SourceCodester Task Progress Tracker 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file update-task.php. The manipulation of the argument task_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Title SourceCodester Task Progress Tracker update-task.php cross site scripting
Weaknesses CWE-79
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-08-26T15:46:37.359Z

Reserved: 2024-08-23T22:26:06.196Z

Link: CVE-2024-8140

cve-icon Vulnrichment

Updated: 2024-08-26T15:37:07.000Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-25T02:15:04.163

Modified: 2024-08-26T19:09:52.653

Link: CVE-2024-8140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.