{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5136","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-05-19T20:41:36.108Z","datePublished":"2024-05-20T09:00:04.307Z","dateUpdated":"2024-08-01T21:03:10.643Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-05-20T09:00:04.307Z"},"title":"PHPGurukul Directory Management System search-directory.php. cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"PHPGurukul","product":"Directory Management System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in PHPGurukul Directory Management System 1.0. Affected is an unknown function of the file /admin/search-directory.php.. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265212."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in PHPGurukul Directory Management System 1.0 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei /admin/search-directory.php.. Mit der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-05-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-05-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-05-19T22:46:56.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Burak (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.265212","name":"VDB-265212 | PHPGurukul Directory Management System search-directory.php. cross site scripting","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.265212","name":"VDB-265212 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.339122","name":"Submit #339122 | PHPGurukul Directory Management System 1.0 Cross-Site-Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md","tags":["exploit"]}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-5136","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-20T16:03:10.240805Z"}}}],"affected":[{"cpes":["cpe:2.3:a:phpgurukul:directory_management_system:1.0:*:*:*:*:*:*:*"],"vendor":"phpgurukul","product":"directory_management_system","versions":[{"status":"affected","version":"1.0"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T18:02:18.974Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:03:10.643Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.265212","name":"VDB-265212 | PHPGurukul Directory Management System search-directory.php. cross site scripting","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.265212","name":"VDB-265212 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.339122","name":"Submit #339122 | PHPGurukul Directory Management System 1.0 Cross-Site-Scripting","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md","tags":["exploit","x_transferred"]}]}]}}