{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2814","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-19T15:30:07.676Z","datePublished":"2023-05-19T16:00:03.907Z","dateUpdated":"2024-08-02T06:33:05.558Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T06:45:20.139Z"},"title":"SourceCodester Class Scheduling System POST Parameter save_teacher.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"SourceCodester","product":"Class Scheduling System","versions":[{"version":"1.0","status":"affected"}],"modules":["POST Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in SourceCodester Class Scheduling System 1.0. Affected is an unknown function of the file /admin/save_teacher.php of the component POST Parameter Handler. The manipulation of the argument Academic_Rank leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229428."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in SourceCodester Class Scheduling System 1.0 entdeckt. Dabei betrifft es einen unbekannter Codeteil der Datei /admin/save_teacher.php der Komponente POST Parameter Handler. Dank Manipulation des Arguments Academic_Rank mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-05-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-19T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-14T13:31:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"CLJY (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.229428","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.229428","tags":["signature","permissions-required"]},{"url":"https://github.com/jiy2020/bugReport/blob/main/XSS.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:33:05.558Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.229428","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.229428","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/jiy2020/bugReport/blob/main/XSS.md","tags":["exploit","x_transferred"]}]}]}}