Products
SourceCodester Food Ordering Management System
- 1.0
Source
cna@vuldb.com
Tags
CVE-2024-8558 details
Published : Sept. 7, 2024, 4:15 p.m.
Last Modified : Sept. 7, 2024, 4:15 p.m.
Last Modified : Sept. 7, 2024, 4:15 p.m.
Description
A vulnerability classified as problematic was found in SourceCodester Food Ordering Management System 1.0. This vulnerability affects unknown code of the file /foms/routers/place-order.php of the component Price Handler. The manipulation of the argument total leads to improper validation of specified quantity in input. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
1 | 2 | 3 | 4.3 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-1284 | Improper Validation of Specified Quantity in Input | The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
Base Score
4.3
Exploitability Score
2.8
Impact Score
1.4
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
References
URL | Source |
---|---|
https://github.com/Niu-zida/cve/blob/main/Payment%20loopholes.md | cna@vuldb.com |
https://vuldb.com/?ctiid.276778 | cna@vuldb.com |
https://vuldb.com/?id.276778 | cna@vuldb.com |
https://vuldb.com/?submit.403345 | cna@vuldb.com |
https://www.sourcecodester.com/ | cna@vuldb.com |
This website uses the NVD API, but is not approved or certified by it.