Plattform
php
Komponente
student-study-center-desk-management-system
Behoben in
1.0.1
A cross-site scripting (XSS) vulnerability has been identified in the Student Study Center Desk Management System, specifically affecting versions 1.0. This flaw allows attackers to inject malicious scripts into the application via manipulation of user input fields. The vulnerability resides within the /sscdms/classes/Users.php file, impacting the HTTP POST Request Handler. A patch is available in version 1.0.1.
Successful exploitation of CVE-2024-6807 allows an attacker to inject arbitrary JavaScript code into the Student Study Center Desk Management System. This code can then be executed in the context of a user's browser when they access a vulnerable page. The attacker could potentially steal session cookies, redirect users to malicious websites, or deface the application. Given the nature of XSS, the impact can range from minor annoyance to significant data compromise, depending on the attacker's goals and the privileges of the affected user. While the CVSS score is LOW, the ease of exploitation and potential for user interaction make this a concerning vulnerability.
This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. No KEV listing or EPSS score is currently available. Public proof-of-concept (PoC) code is likely to emerge given the ease of exploitation and public disclosure. The vulnerability was published on 2024-07-17.
Organizations and individuals using the Student Study Center Desk Management System version 1.0 are at risk. This includes educational institutions, libraries, or any entity utilizing this system for desk management. Shared hosting environments where multiple users share the same server instance are particularly vulnerable, as a compromise of one user could potentially impact others.
• php: Examine the /sscdms/classes/Users.php file for improper input sanitization or output encoding. Search for instances where user-supplied data (firstname, middlename, lastname, username) is directly outputted to the page without proper escaping.
// Example of vulnerable code (simplified)
<?php
echo $_GET['firstname']; // Vulnerable to XSS
?>• generic web: Monitor access logs for requests to /sscdms/classes/Users.php with unusual or suspicious parameters in the firstname, middlename, lastname, or username fields. Look for patterns indicative of XSS attempts (e.g., <script>).
grep 'firstname=.*<script>' access.logdisclosure
Exploit-Status
EPSS
0.23% (46% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-6807 is to upgrade the Student Study Center Desk Management System to version 1.0.1 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the /sscdms/classes/Users.php endpoint to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS attacks can also provide a temporary layer of protection. Regularly review and update the application's security configuration to minimize the attack surface. After upgrade, confirm by testing the /sscdms/classes/Users.php endpoint with various malicious input strings to ensure the vulnerability is no longer present.
Actualice el sistema Student Study Center Desk Management System a una versión posterior a la 1.0, si existe, que corrija la vulnerabilidad de Cross-Site Scripting (XSS). Si no hay una actualización disponible, revise y filtre las entradas de los campos firstname, middlename, lastname y username en el archivo /sscdms/classes/Users.php?f=save para evitar la inyección de código malicioso.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-6807 is a cross-site scripting (XSS) vulnerability affecting Student Study Center Desk Management System version 1.0, allowing attackers to inject malicious scripts via the /sscdms/classes/Users.php endpoint.
You are affected if you are using Student Study Center Desk Management System version 1.0. Upgrade to version 1.0.1 to resolve the issue.
Upgrade to version 1.0.1. As a temporary workaround, implement input validation and output encoding on the /sscdms/classes/Users.php endpoint.
While no active campaigns have been confirmed, the public disclosure of this vulnerability increases the risk of exploitation.
Refer to the SourceCodester website or relevant security forums for the official advisory regarding CVE-2024-6807.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.