平台
php
组件
cve_hub
修复版本
1.0.1
A problematic cross-site scripting (XSS) vulnerability has been identified in Campcodes Online Job Finder System versions 1.0 through 1.0. This flaw resides within the /admin/vacancy/index.php file and allows attackers to inject malicious scripts through manipulation of the 'view' argument. The vulnerability has been publicly disclosed and a patch is available in version 1.0.1.
Successful exploitation of CVE-2024-2679 allows an attacker to execute arbitrary JavaScript code within the context of a user's browser session on the Online Job Finder System. This can lead to various malicious outcomes, including session hijacking, credential theft, and defacement of the administrative interface. An attacker could potentially gain unauthorized access to sensitive data or perform actions on behalf of an administrator. The impact is particularly concerning given the administrative context of the affected file.
This vulnerability has been publicly disclosed and a proof-of-concept may be available. The CVSS score is LOW, indicating a relatively low probability of exploitation in the wild, but the administrative context of the affected file increases the potential impact if exploited. The vulnerability was published on 2024-03-20. It is tracked in the VDB as VDB-257379.
Administrators of Campcodes Online Job Finder System installations running versions 1.0 through 1.0 are at risk. Organizations relying on this system for job postings and applicant management should prioritize patching to prevent potential compromise of administrative accounts and sensitive data.
• php / web: Examine access logs for requests to /admin/vacancy/index.php with unusual or suspicious parameters in the 'view' argument. Look for patterns indicative of XSS payloads (e.g., <script> tags, event handlers).
• generic web: Use curl to test the /admin/vacancy/index.php endpoint with a simple XSS payload (e.g., <script>alert(1)</script>). Observe the response for signs of script execution.
• wordpress / composer / npm: N/A - This vulnerability is not specific to WordPress, Composer, or npm.
• database (mysql, redis, mongodb, postgresql): N/A - This vulnerability is not related to database systems.
• windows / supply-chain: N/A - This vulnerability is not related to Windows or supply chain components.
• linux / server: N/A - This vulnerability is not related to Linux or server components.
disclosure
patch
漏洞利用状态
EPSS
0.08% (24% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2024-2679 is to immediately upgrade to version 1.0.1 of Campcodes Online Job Finder System. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the 'view' parameter within the /admin/vacancy/index.php file to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple XSS payload into the 'view' parameter and verifying that it is properly sanitized.
Actualizar a una versión parcheada del sistema Online Job Finder System. Si no hay una versión disponible, se recomienda sanitizar las entradas del parámetro 'view' en el archivo /admin/vacancy/index.php para evitar la ejecución de código XSS.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2024-2679 is a cross-site scripting (XSS) vulnerability affecting Campcodes Online Job Finder System versions 1.0–1.0, allowing attackers to inject malicious scripts via the /admin/vacancy/index.php file.
You are affected if you are running Campcodes Online Job Finder System versions 1.0–1.0. Upgrade to version 1.0.1 to mitigate the risk.
Upgrade to version 1.0.1 of Campcodes Online Job Finder System. As a temporary workaround, implement input validation and output encoding on the 'view' parameter.
While the CVSS score is LOW, the vulnerability has been publicly disclosed, and exploitation is possible. Monitor your systems for suspicious activity.
Refer to the Campcodes website or relevant security advisories for the official advisory regarding CVE-2024-2679.