Plateforme
php
Composant
stock-management-system
Corrigé dans
1.0.1
A problematic cross-site scripting (XSS) vulnerability has been identified in CodeAstro Stock Management System versions 1.0 through 1.0. This flaw allows attackers to inject malicious scripts by manipulating the Category Name or Category Description within the /index.php file. The vulnerability has been publicly disclosed and a patch is available in version 1.0.1.
Successful exploitation of CVE-2024-0958 allows an attacker to execute arbitrary JavaScript code within the context of a user's browser session on the Stock Management System. This can lead to session hijacking, credential theft, defacement of the application, or redirection to malicious websites. The impact is particularly severe if the application handles sensitive data or is integrated with other systems, as the attacker could potentially gain access to that data or use the compromised system as a launchpad for further attacks. The ability to inject scripts remotely makes this a significant risk.
This vulnerability has been publicly disclosed and a proof-of-concept may be available. The CVSS score of 3.5 (LOW) indicates a relatively low probability of exploitation, but the ease of exploitation and potential impact warrant prompt remediation. The vulnerability is tracked in the VDB as VDB-252203. No KEV listing or confirmed exploitation campaigns are currently known.
Organizations utilizing CodeAstro Stock Management System version 1.0, particularly those with publicly accessible instances or those handling sensitive customer data, are at risk. Shared hosting environments where multiple users share the same instance of the Stock Management System are also particularly vulnerable, as an attacker could potentially compromise other users' accounts.
• php / web: Examine access logs for requests to /index.php with unusual or suspicious parameters in the Category Name/Category Description fields. Use grep to search for patterns indicative of XSS payloads (e.g., <script>alert(1)</script>). • generic web: Use curl/wget to test the /index.php endpoint with various XSS payloads and observe the response for script execution. • wordpress / composer / npm: N/A - This vulnerability is not specific to WordPress, Composer, or npm. • database (mysql, redis, mongodb, postgresql): N/A - This vulnerability is not specific to databases. • windows / supply-chain: N/A - This vulnerability is not specific to Windows or supply-chain components. • linux / server: N/A - This vulnerability is not specific to Linux servers.
disclosure
Statut de l'Exploit
EPSS
0.17% (percentile 38%)
Vecteur CVSS
The primary mitigation for CVE-2024-0958 is to immediately upgrade to CodeAstro Stock Management System version 1.0.1 or later. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the Category Name and Category Description fields to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Review access logs for suspicious activity related to the /index.php endpoint. After upgrade, confirm the vulnerability is resolved by attempting to inject a simple XSS payload into the Category Name/Description fields and verifying that the script is not executed.
Actualizar a una versión parcheada del sistema de gestión de inventario. Si no hay una versión disponible, sanitizar las entradas de usuario en el archivo /index.php, especialmente los campos 'Category Name' y 'Category Description', para evitar la ejecución de código JavaScript malicioso.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2024-0958 is a cross-site scripting (XSS) vulnerability in CodeAstro Stock Management System versions 1.0–1.0, allowing attackers to inject malicious scripts via the /index.php file.
You are affected if you are using CodeAstro Stock Management System version 1.0–1.0. Upgrade to version 1.0.1 or later to mitigate the risk.
Upgrade to CodeAstro Stock Management System version 1.0.1 or later. Implement input validation and output encoding as a temporary workaround.
While no confirmed exploitation campaigns are currently known, the vulnerability has been publicly disclosed and a proof-of-concept may be available, increasing the risk of exploitation.
Refer to the CodeAstro website or relevant security mailing lists for the official advisory regarding CVE-2024-0958.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.