Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45985: n/a

0
Medium
VulnerabilityCVE-2024-45985cvecve-2024-45985
Published: Thu Sep 26 2024 (09/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A Cross Site Scripting (XSS) vulnerability in update_contact.php of Blood Bank and Donation Management System v1.0 allows an attacker to inject malicious scripts via the name parameter of the update_contact.php

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:12:07 UTC

Technical Analysis

CVE-2024-45985 identifies a Cross Site Scripting (XSS) vulnerability in the update_contact.php file of the Blood Bank and Donation Management System version 1.0. This vulnerability arises from insufficient sanitization of user-supplied input in the 'name' parameter, allowing attackers to inject malicious JavaScript code. When a victim accesses a manipulated URL or submits crafted input, the malicious script executes in their browser context, potentially enabling session hijacking, defacement, or redirection to malicious sites. The vulnerability requires no authentication but does require user interaction, such as clicking a malicious link or submitting a form. The CVSS 3.1 base score is 4.7 (medium), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and impacting integrity without affecting confidentiality or availability. No patches or known exploits are currently available, indicating the vulnerability is newly disclosed. The affected software is specialized healthcare management software, which may limit the scope but also targets sensitive environments. The CWE-79 classification confirms this is a classic reflected or stored XSS issue. Mitigation involves proper input validation, output encoding, and implementing Content Security Policy (CSP) headers to reduce script execution risks.

Potential Impact

The primary impact of this vulnerability is the potential execution of malicious scripts in the browsers of users interacting with the affected Blood Bank and Donation Management System. This can lead to session hijacking, unauthorized actions performed on behalf of users, phishing attacks, or defacement of the web interface. Although confidentiality is not directly compromised, the integrity of user interactions and data can be affected. Given the healthcare context, attackers could exploit this to manipulate contact information or disrupt communication workflows, potentially impacting patient care coordination. The requirement for user interaction limits automated exploitation, but social engineering could increase risk. Since no authentication is required, any user or external attacker can attempt exploitation. The absence of known exploits suggests limited current impact, but the vulnerability could be leveraged in targeted attacks against healthcare organizations using this system.

Mitigation Recommendations

To mitigate CVE-2024-45985, organizations should immediately implement strict input validation on the 'name' parameter in update_contact.php, ensuring that all user-supplied data is sanitized to remove or encode potentially malicious characters. Employing output encoding techniques, such as HTML entity encoding, will prevent injected scripts from executing in the browser. Implementing a robust Content Security Policy (CSP) can further restrict the execution of unauthorized scripts. Additionally, web application firewalls (WAFs) can be configured to detect and block common XSS payloads targeting this parameter. Regular security testing, including automated scanning and manual code reviews, should be conducted to identify similar vulnerabilities. Organizations should monitor for updates or patches from the software vendor and apply them promptly once available. Educating users about the risks of clicking untrusted links can reduce the likelihood of successful exploitation. Finally, isolating the affected system within the network and limiting access can reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf6b7ef31ef0b56a865

Added to database: 2/25/2026, 9:43:18 PM

Last enriched: 2/28/2026, 7:12:07 AM

Last updated: 4/12/2026, 1:59:59 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses