LOWCVE-2024-0283CVSS 3.5

Kashipara Food Management System party_details.php cross site scripting

traduction en cours…

Plateforme

php

Composant

cve_hub

Corrigé dans

1.0.1

AI Confidence: highNVDEPSS 0.1%Révisé: mai 2026
Traduction vers votre langue…

CVE-2024-0283 is a cross-site scripting (XSS) vulnerability affecting the Kashipara Food Management System versions 1.0 through 1.0. This vulnerability allows attackers to inject malicious scripts into the application, potentially compromising user sessions and data. A fix is available in version 1.0.1, and the exploit has been publicly disclosed.

Impact et Scénarios d'Attaquetraduction en cours…

Successful exploitation of CVE-2024-0283 allows an attacker to execute arbitrary JavaScript code within the context of a user's browser session. This can lead to various malicious actions, including stealing session cookies, redirecting users to phishing sites, or defacing the application. The impact is particularly severe if the application handles sensitive data, as an attacker could potentially gain access to confidential information. The vulnerability's remote accessibility significantly expands the potential attack surface, as it can be exploited from anywhere with network access to the vulnerable system. While the CVSS score is LOW, the ease of exploitation and potential for session hijacking make it a significant risk.

Contexte d'Exploitationtraduction en cours…

This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. No KEV listing is currently available. Public proof-of-concept (PoC) code is likely to emerge given the vulnerability's nature and public disclosure. The NVD was published on 2024-01-07.

Qui Est à Risquetraduction en cours…

Organizations utilizing the Kashipara Food Management System, particularly those with publicly accessible instances, are at risk. Shared hosting environments where multiple users share the same server instance are especially vulnerable, as an attacker could potentially exploit the vulnerability through another user's account.

Étapes de Détectiontraduction en cours…

• wordpress / composer / npm:

grep -r "party_details.php" ./

• generic web:

curl -I http://your-website.com/party_details.php?party_name=<script>alert('XSS')</script>

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

0.07% (percentile 22%)

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N3.5LOWAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredLowNiveau d'authentification requisUser InteractionRequiredSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityNoneRisque d'exposition de données sensiblesIntegrityLowRisque de modification non autorisée de donnéesAvailabilityNoneRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Faible — tout compte utilisateur valide est suffisant.
User Interaction
Requise — la victime doit ouvrir un fichier, cliquer sur un lien ou visiter une page.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Aucun — aucun impact sur la confidentialité.
Integrity
Faible — l'attaquant peut modifier certaines données avec un impact limité.
Availability
Aucun — aucun impact sur la disponibilité.

Logiciel Affecté

Composantcve_hub
FournisseurKashipara
Plage affectéeCorrigé dans
1.0 – 1.01.0.1

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2024-0283 is to upgrade to version 1.0.1 of the Kashipara Food Management System. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the partyname parameter in partydetails.php. This can help prevent malicious scripts from being injected. Web application firewalls (WAFs) configured to detect and block XSS attacks can also provide an additional layer of protection. Regularly review and update input sanitization routines to prevent similar vulnerabilities from arising in the future. After upgrade, confirm by testing the party_details.php page with various inputs, including those containing potential XSS payloads.

Comment corrigertraduction en cours…

Actualice Kashipara Food Management System a una versión parcheada que solucione la vulnerabilidad XSS en party_details.php. Si no hay una versión disponible, revise y filtre las entradas del parámetro party_name para evitar la inyección de código malicioso. Implemente validación y sanitización de datos en el lado del servidor para prevenir ataques XSS.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2024-0283 — XSS in Kashipara Food Management System?

CVE-2024-0283 is a cross-site scripting (XSS) vulnerability in Kashipara Food Management System versions 1.0–1.0, allowing attackers to inject malicious scripts.

Am I affected by CVE-2024-0283 in Kashipara Food Management System?

You are affected if you are using Kashipara Food Management System version 1.0 or 1.0. Upgrade to 1.0.1 to mitigate the risk.

How do I fix CVE-2024-0283 in Kashipara Food Management System?

Upgrade to version 1.0.1. If immediate upgrade is not possible, implement input validation and output encoding on the party_name parameter.

Is CVE-2024-0283 being actively exploited?

While active exploitation is not confirmed, the vulnerability has been publicly disclosed, increasing the likelihood of exploitation.

Where can I find the official Kashipara Food Management System advisory for CVE-2024-0283?

Refer to the vendor's website or security advisories for the official advisory regarding CVE-2024-0283.

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.