{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7360","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-08-01T07:37:27.122Z","datePublished":"2024-08-01T17:31:04.038Z","dateUpdated":"2024-08-07T14:30:42.876Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-08-01T17:31:04.038Z"},"title":"SourceCodester Tracking Monitoring Management System ajax.php cross-site request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-352","lang":"en","description":"CWE-352 Cross-Site Request Forgery"}]}],"affected":[{"vendor":"SourceCodester","product":"Tracking Monitoring Management System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in SourceCodester Tracking Monitoring Management System 1.0. This affects an unknown part of the file /ajax.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273339."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Tracking Monitoring Management System 1.0 entdeckt. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /ajax.php. Dank der Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-08-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-08-01T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-08-01T09:42:58.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"topsky979 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.273339","name":"VDB-273339 | SourceCodester Tracking Monitoring Management System ajax.php cross-site request forgery","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.273339","name":"VDB-273339 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.383495","name":"Submit #383495 | SourceCodester Tracking/Monitoring Management System  1.0 Cross-Site Request Forgery","tags":["third-party-advisory"]},{"url":"https://gist.github.com/topsky979/ac97a335ed9fcf4eefe3c952928a6d0e","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"sourcecodester","product":"tracking_monitoring_management_system","cpes":["cpe:2.3:a:sourcecodester:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-07T14:29:53.560250Z","id":"CVE-2024-7360","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-07T14:30:42.876Z"}}]}}