{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10755","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-11-03T07:06:11.753Z","datePublished":"2024-11-04T02:31:08.131Z","dateUpdated":"2024-11-04T17:04:57.379Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-11-04T02:31:08.131Z"},"title":"PHPGurukul Online Shopping Portal empty_table.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]}],"affected":[{"vendor":"PHPGurukul","product":"Online Shopping Portal","versions":[{"version":"2.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in PHPGurukul Online Shopping Portal 2.0. Affected is an unknown function of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/empty_table.php. The manipulation of the argument scripts leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in PHPGurukul Online Shopping Portal 2.0 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Datei /admin/assets/plugins/DataTables/media/unit_testing/templates/empty_table.php. Durch Manipulation des Arguments scripts mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-11-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-11-03T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-11-03T08:11:26.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"secuserx (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.282924","name":"VDB-282924 | PHPGurukul Online Shopping Portal empty_table.php cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.282924","name":"VDB-282924 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.436377","name":"Submit #436377 | PHPGurukul Online Shopping Portal 2.0 Improper Neutralization of Alternate XSS Syntax","tags":["third-party-advisory"]},{"url":"https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(empty_table.php).md","tags":["exploit"]},{"url":"https://phpgurukul.com/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"phpgurukul","product":"online_shopping_portal","cpes":["cpe:2.3:a:phpgurukul:online_shopping_portal:2.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-04T17:04:31.230601Z","id":"CVE-2024-10755","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-04T17:04:57.379Z"}}]}}