Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40473: n/a

0
Medium
VulnerabilityCVE-2024-40473cvecve-2024-40473
Published: Thu Aug 08 2024 (08/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-40473 is a stored Cross Site Scripting (XSS) vulnerability found in the 'manage_houses. php' component of the SourceCodester Best House Rental Management System v1. 0. It allows remote attackers with limited privileges to inject malicious scripts via the 'House_no' and 'Description' parameters. Exploitation requires user interaction and privileges but can lead to session hijacking or code execution in the context of the victim's browser. The vulnerability has a CVSS score of 5. 4 (medium severity) and does not currently have known exploits in the wild. No official patches have been published yet. Organizations using this system should prioritize input validation and sanitization to mitigate risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:42:27 UTC

Technical Analysis

CVE-2024-40473 is a stored Cross Site Scripting (XSS) vulnerability identified in the 'manage_houses.php' file of the SourceCodester Best House Rental Management System version 1.0. This vulnerability arises from improper sanitization of user-supplied input in the 'House_no' and 'Description' parameters, which are stored and later rendered in web pages without adequate encoding. An attacker with limited privileges can inject malicious JavaScript code that will be executed in the browsers of users who view the affected pages. The vulnerability requires the attacker to have some level of authenticated access (PR:L) and user interaction (UI:R) to trigger the exploit, but no elevated privileges are necessary. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. Stored XSS vulnerabilities can lead to session hijacking, defacement, or redirection to malicious sites, posing significant risks to users and organizations. No patches or mitigations have been officially released, and no known exploits are currently in the wild. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation.

Potential Impact

The impact of CVE-2024-40473 primarily affects the confidentiality and integrity of user sessions and data within the Best House Rental Management System environment. Successful exploitation can allow attackers to execute arbitrary scripts in the context of other users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of victims. While availability is not impacted, the reputational damage and trust erosion for organizations using this system can be significant. Because the vulnerability requires some level of authenticated access and user interaction, the attack surface is somewhat limited, but internal users or attackers who have gained limited access could leverage this to escalate their privileges or compromise other users. Organizations relying on this system for property management may face data breaches or unauthorized data manipulation if the vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-40473, organizations should implement strict input validation and output encoding on the 'House_no' and 'Description' fields within the 'manage_houses.php' script. Employing a robust web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patch is currently available, developers should review and sanitize all user inputs using context-appropriate encoding libraries such as OWASP's Java Encoder or similar frameworks. Additionally, enforcing the principle of least privilege to restrict user permissions can reduce the risk of exploitation. Regular security audits and penetration testing focused on input validation should be conducted. Educating users about the risks of clicking on suspicious links or executing untrusted scripts can help mitigate social engineering aspects. Monitoring logs for unusual input patterns or script injections can aid in early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6caab7ef31ef0b567de5

Added to database: 2/25/2026, 9:42:02 PM

Last enriched: 2/26/2026, 6:42:27 AM

Last updated: 2/26/2026, 9:35:35 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats