A vulnerability has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/manage-ambulance.php of the component Manage Ambulance Page. The manipulation of the argument del leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258682 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md | Exploit |
https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md | Exploit |
https://vuldb.com/?ctiid.258682 | Permissions Required VDB Entry |
https://vuldb.com/?ctiid.258682 | Permissions Required VDB Entry |
https://vuldb.com/?id.258682 | Third Party Advisory VDB Entry |
https://vuldb.com/?id.258682 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.306963 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.306963 | Third Party Advisory VDB Entry |
Configurations
History
14 Feb 2025, 19:26
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Phpgurukul emergency Ambulance Hiring Portal
Phpgurukul |
|
CPE | cpe:2.3:a:phpgurukul:emergency_ambulance_hiring_portal:1.0:*:*:*:*:*:*:* | |
References | () https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md - Exploit | |
References | () https://vuldb.com/?ctiid.258682 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?submit.306963 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.258682 - Third Party Advisory, VDB Entry |
30 Mar 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-30 12:15
Updated : 2025-02-14 19:26
NVD link : CVE-2024-3089
Mitre link : CVE-2024-3089
JSON object : View
Products Affected
phpgurukul
- emergency_ambulance_hiring_portal
CWE
No CWE.