{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1686","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-28T20:31:44.835Z","datePublished":"2023-03-29T07:00:06.029Z","dateUpdated":"2025-02-12T16:25:41.988Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-21T13:54:06.598Z"},"title":"SourceCodester Young Entrepreneur E-Negosyo System GET Parameter index.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"SourceCodester","product":"Young Entrepreneur E-Negosyo System","versions":[{"version":"1.0","status":"affected"}],"modules":["GET Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file bsenordering/admin/category/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(233)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224243."},{"lang":"de","value":"Eine Schwachstelle wurde in SourceCodester Young Entrepreneur E-Negosyo System 1.0 ausgemacht. Sie wurde als problematisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei bsenordering/admin/category/index.php der Komponente GET Parameter Handler. Durch Manipulieren des Arguments view mit der Eingabe <script>alert(233)</script> mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-03-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-28T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-28T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-16T14:44:50.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"aroc (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.224243","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.224243","tags":["signature","permissions-required"]},{"url":"https://github.com/Apeng96/bug_report/blob/main/XSS-1.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:57:25.025Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.224243","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.224243","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/Apeng96/bug_report/blob/main/XSS-1.md","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-12T16:25:36.768900Z","id":"CVE-2023-1686","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-12T16:25:41.988Z"}}]}}