{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-9805","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-10T07:52:50.180Z","datePublished":"2024-10-10T18:00:06.750Z","dateUpdated":"2024-10-10T18:16:24.940Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-10T18:00:06.750Z"},"title":"code-projects Blood Bank System campsdetails.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]}],"affected":[{"vendor":"code-projects","product":"Blood Bank System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in code-projects Blood Bank System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/campsdetails.php. The manipulation of the argument hospital/address/city/contact leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"hospital\"."},{"lang":"de","value":"Eine Schwachstelle wurde in code-projects Blood Bank System 1.0 ausgemacht. Sie wurde als problematisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /admin/campsdetails.php. Durch die Manipulation des Arguments hospital/address/city/contact mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-10-10T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-10T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-10T10:57:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"sqliii (VulDB User)","type":"reporter"},{"lang":"en","value":"sqliii (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.279953","name":"VDB-279953 | code-projects Blood Bank System campsdetails.php cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.279953","name":"VDB-279953 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.418619","name":"Submit #418619 | code-projects blood-bank-system-in-php v1.0 Basic Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/sternstundes/cve/blob/main/xss5.md","tags":["exploit"]},{"url":"https://code-projects.org/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"code-projects","product":"blood_bank_system","cpes":["cpe:2.3:a:code-projects:blood_bank_system:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-10T18:15:43.340444Z","id":"CVE-2024-9805","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-10T18:16:24.940Z"}}]}}