{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6650","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-09T17:22:15.751Z","datePublished":"2023-12-10T10:31:04.231Z","dateUpdated":"2024-11-21T15:20:54.288Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-10T10:31:04.231Z"},"title":"SourceCodester Simple Invoice Generator System login.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"SourceCodester","product":"Simple Invoice Generator System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Simple Invoice Generator System 1.0 and classified as problematic. This issue affects some unknown processing of the file login.php. The manipulation of the argument cashier leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247343."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in SourceCodester Simple Invoice Generator System 1.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei login.php. Durch Manipulieren des Arguments cashier mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-12-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-09T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-09T18:27:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xuzisen (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.247343","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.247343","tags":["signature","permissions-required"]},{"url":"https://github.com/x1280/CVE/blob/main/Cross-site%20Scriping_cashier.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:35:14.833Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.247343","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.247343","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/x1280/CVE/blob/main/Cross-site%20Scriping_cashier.md","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2023-12-18T21:04:19.591560Z","id":"CVE-2023-6650","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-21T15:20:54.288Z"}}]}}