{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3189","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-06-10T04:06:17.792Z","datePublished":"2023-06-14T05:31:03.452Z","dateUpdated":"2024-08-02T06:48:07.833Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T13:05:08.382Z"},"title":"SourceCodester Online School Fees System POST Parameter branch.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"SourceCodester","product":"Online School Fees System","versions":[{"version":"1.0","status":"affected"}],"modules":["POST Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in SourceCodester Online School Fees System 1.0. This affects an unknown part of the file /paysystem/branch.php of the component POST Parameter Handler. The manipulation of the argument branch leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231501 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in SourceCodester Online School Fees System 1.0 gefunden. Hiervon betroffen ist ein unbekannter Codeblock der Datei /paysystem/branch.php der Komponente POST Parameter Handler. Mittels Manipulieren des Arguments branch mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-06-10T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-06-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-06-14T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-07-13T09:11:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"zhangyf (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.231501","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.231501","tags":["signature","permissions-required"]},{"url":"https://github.com/M9KJ-TEAM/CVEReport/blob/main/XSS.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:48:07.833Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.231501","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.231501","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/M9KJ-TEAM/CVEReport/blob/main/XSS.md","tags":["exploit","x_transferred"]}]}]}}