{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-7124","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-27T18:00:16.908Z","datePublished":"2023-12-28T02:31:04.389Z","dateUpdated":"2024-08-02T08:50:08.284Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-28T02:31:04.389Z"},"title":"code-projects E-Commerce Site search.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"code-projects","product":"E-Commerce Site","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in code-projects E-Commerce Site 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument keyword with the input <video/src=x onerror=alert(document.cookie)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249096."},{"lang":"de","value":"Es wurde eine Schwachstelle in code-projects E-Commerce Site 1.0 gefunden. Sie wurde als problematisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei search.php. Dank Manipulation des Arguments keyword mit der Eingabe <video/src=x onerror=alert(document.cookie)> mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-12-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-27T19:05:47.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Hamdi Sevben (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.249096","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.249096","tags":["signature","permissions-required"]},{"url":"https://github.com/h4md153v63n/CVEs/blob/main/E-commerce_Site/E-commerce_Site-Reflected_Cross_Site_Scripting.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:50:08.284Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.249096","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.249096","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/h4md153v63n/CVEs/blob/main/E-commerce_Site/E-commerce_Site-Reflected_Cross_Site_Scripting.md","tags":["exploit","x_transferred"]}]}]}}