Cross Site Scripting Vulnerability in Ambulance-Tracking.php Could Lead to Remote Exploitation
CVE-2024-3086

4.3MEDIUM

Key Information:

Vendor
PHPgurukul
Vendor
CVE Published:
30 March 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A vulnerability has been identified in the PHPGurukul Emergency Ambulance Hiring Portal version 1.0. This issue is located in the file ambulance-tracking.php, specifically within its searchdata argument. Attackers can exploit this vulnerability to execute cross-site scripting (XSS) attacks remotely, potentially compromising the integrity and confidentiality of user data. The exploit has been made public, raising concerns about the security of systems that utilize this software. Organizations using this version are strongly advised to apply appropriate security measures to mitigate possible exploitation.

Affected Version(s)

Emergency Ambulance Hiring Portal 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

dhabaleshwar (VulDB User)
.