Skip to main content

CVE-2024-0500: CWE-79 Cross Site Scripting in SourceCodester House Rental Management System

Low
VulnerabilityCVE-2024-0500cvecve-2024-0500cwe-79
Published: Sat Jan 13 2024 (01/13/2024, 19:00:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: House Rental Management System

Description

A vulnerability, which was classified as problematic, was found in SourceCodester House Rental Management System 1.0. Affected is an unknown function of the component Manage Tenant Details. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250608.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:56:23 UTC

Technical Analysis

CVE-2024-0500 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester House Rental Management System, specifically within the Manage Tenant Details component. The vulnerability arises from improper sanitization or validation of the 'Name' argument, which allows an attacker to inject malicious scripts. This injection can be executed remotely, but requires the attacker to have high privileges (PR:H) and user interaction (UI:R) to trigger the exploit. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to XSS. The CVSS v3.1 base score is 2.4, indicating a low severity level, with no impact on confidentiality, limited impact on integrity, and no impact on availability. The attack vector is network-based (AV:N), but exploitation requires authentication and user interaction, limiting the ease of exploitation. No public exploits are currently known to be in the wild, and no patches have been published yet. The vulnerability disclosure date is January 13, 2024.

Potential Impact

For European organizations using the SourceCodester House Rental Management System 1.0, this vulnerability could allow an authenticated attacker with high privileges to inject malicious scripts into the tenant management interface. Although the impact is low, the injected scripts could be used to manipulate displayed data or perform limited integrity attacks, potentially misleading users or administrators. However, since there is no confidentiality or availability impact, the risk is primarily related to data integrity and user trust. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation. Nonetheless, organizations handling sensitive tenant data should be cautious as XSS vulnerabilities can sometimes be leveraged as part of more complex attack chains, including session hijacking or phishing within the application context.

Mitigation Recommendations

European organizations should implement strict input validation and output encoding on the 'Name' field within the Manage Tenant Details component to prevent script injection. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patch is available, organizations should consider restricting access to the affected component to trusted users only and monitor logs for suspicious activity related to tenant data modifications. Regular security training for administrators to recognize and avoid triggering malicious scripts is advisable. Additionally, organizations should plan to update the software once a vendor patch is released and consider conducting a thorough security review of all input handling in the application to identify similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-12T12:48:44.016Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e669b

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 2:56:23 PM

Last updated: 7/27/2025, 1:11:29 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats