A vulnerability has been found in CodeAstro Hospital Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /backend/admin/his_admin_register_patient.php of the component Add Patient Details Page. The manipulation of the argument pat_fname/pat_ailment/pat_lname/pat_age/pat_dob/pat_number/pat_phone/pat_type/pat_addr leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
History

Wed, 04 Dec 2024 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul hospital Management System
CPEs cpe:2.3:a:phpgurukul:hospital_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Phpgurukul
Phpgurukul hospital Management System

Tue, 26 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Codeastro
Codeastro hospital Management System
CPEs cpe:2.3:a:codeastro:hospital_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Codeastro
Codeastro hospital Management System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 00:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in CodeAstro Hospital Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /backend/admin/his_admin_register_patient.php of the component Add Patient Details Page. The manipulation of the argument pat_fname/pat_ailment/pat_lname/pat_age/pat_dob/pat_number/pat_phone/pat_type/pat_addr leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title CodeAstro Hospital Management System Add Patient Details Page his_admin_register_patient.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-26T00:00:14.822Z

Updated: 2024-11-26T15:33:47.856Z

Reserved: 2024-11-25T14:44:50.051Z

Link: CVE-2024-11675

cve-icon Vulnrichment

Updated: 2024-11-26T15:33:42.341Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-26T01:15:04.150

Modified: 2024-12-04T20:15:39.110

Link: CVE-2024-11675

cve-icon Redhat

No data.