// For flags

CVE-2024-6526

CodeIgniter Ecommerce-CodeIgniter-Bootstrap cross site scripting

Severity Score

5.3
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability classified as problematic has been found in CodeIgniter Ecommerce-CodeIgniter-Bootstrap up to 1998845073cf433bc6c250b0354461fbd84d0e03. This affects an unknown part. The manipulation of the argument search_title/catName/sub/name/categorie leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 1b3da45308bb6c3f55247d0e99620b600bd85277. It is recommended to apply a patch to fix this issue. The identifier VDB-270369 was assigned to this vulnerability.

Una vulnerabilidad ha sido encontrada en CodeIgniter Ecommerce-CodeIgniter-Bootstrap hasta 1998845073cf433bc6c250b0354461fbd84d0e03 y clasificada como problemática. Esto afecta a una parte desconocida. La manipulación del argumento search_title/catName/sub/name/categorie conduce a Cross Site Scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador del parche es 1b3da45308bb6c3f55247d0e99620b600bd85277. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asignó el identificador VDB-270369.

Es wurde eine Schwachstelle in CodeIgniter Ecommerce-CodeIgniter-Bootstrap bis 1998845073cf433bc6c250b0354461fbd84d0e03 entdeckt. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf. Dank der Manipulation des Arguments search_title/catName/sub/name/categorie mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als 1b3da45308bb6c3f55247d0e99620b600bd85277 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.

*Credits: Juan Carlos Martinez, evilcode52 , evilcode52
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
Low
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-07-05 CVE Reserved
  • 2024-07-05 CVE Published
  • 2024-07-09 EPSS Updated
  • 2024-08-01 CVE Updated
  • 2024-08-01 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ecommerce-codeigniter-bootstrap Project
Search vendor "Ecommerce-codeigniter-bootstrap Project"
Ecommerce-codeigniter-bootstrap
Search vendor "Ecommerce-codeigniter-bootstrap Project" for product "Ecommerce-codeigniter-bootstrap"
< 2024-07-03
Search vendor "Ecommerce-codeigniter-bootstrap Project" for product "Ecommerce-codeigniter-bootstrap" and version " < 2024-07-03"
-
Affected