{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6297","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-11-26T07:21:11.672Z","datePublished":"2023-11-26T22:31:04.240Z","dateUpdated":"2025-06-03T14:03:48.835Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-11-26T22:31:04.240Z"},"title":"PHPGurukul Nipah Virus Testing Management System Search Report Page patient-search-report.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"PHPGurukul","product":"Nipah Virus Testing Management System","versions":[{"version":"1.0","status":"affected"}],"modules":["Search Report Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123."},{"lang":"de","value":"Es wurde eine Schwachstelle in PHPGurukul Nipah Virus Testing Management System 1.0 entdeckt. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei patient-search-report.php der Komponente Search Report Page. Durch das Beeinflussen des Arguments Search By Patient Name mit der Eingabe <script>alert(document.cookie)</script> mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-11-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-11-26T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-11-26T08:26:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"dhabaleshwar (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.246123","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.246123","tags":["signature","permissions-required"]},{"url":"https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:28:21.541Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.246123","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.246123","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-03T14:02:42.704679Z","id":"CVE-2023-6297","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-03T14:03:48.835Z"}}]}}