Skip to main content

CVE-2024-0423: CWE-79 Cross Site Scripting in CodeAstro Online Food Ordering System

Low
VulnerabilityCVE-2024-0423cvecve-2024-0423cwe-79
Published: Thu Jan 11 2024 (01/11/2024, 19:31:03 UTC)
Source: CVE
Vendor/Project: CodeAstro
Product: Online Food Ordering System

Description

A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file dishes.php. The manipulation of the argument res_id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250442 is the identifier assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/06/2025, 13:56:22 UTC

Technical Analysis

CVE-2024-0423 is a Cross Site Scripting (XSS) vulnerability identified in version 1.0 of the CodeAstro Online Food Ordering System. The vulnerability resides in the dishes.php file, specifically in the handling of the 'res_id' parameter. An attacker can manipulate this parameter to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS. The attack vector is remote, requiring the attacker to trick a user into interacting with a crafted URL or input that contains the malicious payload. The vulnerability requires low privileges (PR:L) and user interaction (UI:R) to be exploited, and it does not impact confidentiality or availability but can lead to integrity issues such as session hijacking or defacement. The CVSS v3.1 base score is 3.5, indicating a low severity level. No patches have been published yet, and there are no known exploits in the wild at this time. However, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is an online food ordering platform, potentially exposing customers and restaurant operators to malicious script execution within their browsers.

Potential Impact

For European organizations using the CodeAstro Online Food Ordering System version 1.0, this vulnerability could lead to targeted phishing attacks, session hijacking, or unauthorized actions performed on behalf of legitimate users. While the direct impact on system confidentiality and availability is minimal, the integrity of user sessions and data can be compromised. This could damage customer trust, lead to data leakage of user credentials or personal information, and potentially facilitate further attacks such as account takeover or fraud. Given the nature of online food ordering systems, which often handle payment information and personal data, even a low-severity XSS vulnerability can have reputational and financial consequences. Additionally, regulatory compliance under GDPR requires organizations to protect personal data, and exploitation of this vulnerability could lead to violations if personal data is compromised.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'res_id' parameter within dishes.php to neutralize any malicious scripts. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the sources from which scripts can be loaded. Web Application Firewalls (WAFs) configured to detect and block XSS payloads targeting this parameter can provide an additional layer of defense. Since no official patch is available, organizations should consider temporarily disabling or restricting access to the affected functionality if feasible. Regular security testing, including automated scanning for XSS vulnerabilities and manual code reviews, should be conducted. Educating users about the risks of clicking on suspicious links can also reduce the likelihood of successful exploitation. Monitoring web server logs for unusual request patterns targeting 'res_id' parameters may help in early detection of attempted attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-11T12:22:19.973Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8cc

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 1:56:22 PM

Last updated: 8/11/2025, 8:20:33 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats