Skip to main content

CVE-2024-1269: CWE-79 Cross Site Scripting in SourceCodester Product Management System

Low
VulnerabilityCVE-2024-1269cvecve-2024-1269cwe-79
Published: Wed Feb 07 2024 (02/07/2024, 02:00:05 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Product Management System

Description

A vulnerability has been found in SourceCodester Product Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /supplier.php. The manipulation of the argument supplier_name/supplier_contact leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253012.

AI-Powered Analysis

AILast updated: 07/11/2025, 21:49:14 UTC

Technical Analysis

CVE-2024-1269 is a Cross-Site Scripting (XSS) vulnerability identified in SourceCodester Product Management System version 1.0. The vulnerability exists in the /supplier.php file, specifically through improper handling and sanitization of the input parameters supplier_name and supplier_contact. An attacker can remotely manipulate these parameters to inject malicious scripts into the web application. When a victim user accesses the affected page, the injected script executes in their browser context, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The CVSS v3.1 base score is 2.4, indicating a low severity level. The vector string (AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N) shows that the attack is network exploitable with low attack complexity but requires high privileges and user interaction. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability disclosure date is February 7, 2024.

Potential Impact

For European organizations using SourceCodester Product Management System 1.0, this XSS vulnerability could lead to limited integrity impacts such as unauthorized script execution in the context of authenticated users with high privileges. Although the CVSS score is low and confidentiality and availability impacts are not present, the integrity compromise could allow attackers to perform actions on behalf of privileged users, potentially modifying supplier data or manipulating the system's behavior. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation. However, organizations with critical supplier management workflows relying on this system might face operational disruptions or data manipulation risks. Additionally, if attackers combine this vulnerability with social engineering, they could escalate the impact. Given the lack of patches, organizations must be cautious and consider compensating controls.

Mitigation Recommendations

Specific mitigations include: 1) Implement strict input validation and output encoding on supplier_name and supplier_contact parameters to neutralize any injected scripts. 2) Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of XSS attacks. 3) Restrict access to the /supplier.php page to only trusted users and monitor for unusual activities or input patterns. 4) Educate privileged users about the risks of clicking on suspicious links or interacting with untrusted content to reduce the chance of successful user interaction exploitation. 5) If possible, upgrade to a newer, patched version of the product once available or apply custom patches to sanitize inputs. 6) Use Web Application Firewalls (WAFs) with rules targeting XSS payloads on the affected parameters. 7) Conduct regular security assessments and code reviews focused on input handling in the product management system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-02-06T08:50:28.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f531b0bd07c39389f01

Added to database: 6/10/2025, 6:54:11 PM

Last enriched: 7/11/2025, 9:49:14 PM

Last updated: 7/27/2025, 2:06:52 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats