Vulnerability Description
A vulnerability has been found in CodeAstro Hospital Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /backend/admin/his_admin_register_patient.php of the component Add Patient Details Page. The manipulation of the argument pat_fname/pat_ailment/pat_lname/pat_age/pat_dob/pat_number/pat_phone/pat_type/pat_addr leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpgurukul | Hospital Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://codeastro.com/Product
- https://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.mdExploitMitigationThird Party Advisory
- https://vuldb.com/?ctiid.286015Permissions Required
- https://vuldb.com/?id.286015Third Party Advisory
- https://www.youtube.com/watch?v=UsScmd8XzuwExploit
FAQ
What is CVE-2024-11675?
CVE-2024-11675 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability has been found in CodeAstro Hospital Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /backend/admin/his_admi...
How severe is CVE-2024-11675?
CVE-2024-11675 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-11675?
Check the references section above for vendor advisories and patch information. Affected products include: Phpgurukul Hospital Management System.