A vulnerability was found in SourceCodester Canteen Management System. It has been classified as problematic. This affects the function query of the file food.php. The manipulation of the argument product_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214359.
{"id": "CVE-2022-4091", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2022-4091", "description": "A vulnerability was found in SourceCodester Canteen Management System. It has been classified as problematic. This affects the function query of the file food.php. The manipulation of the argument product_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214359.", "published": "2022-11-25T08:15:00", "modified": "2022-11-30T21:19:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4091", "reporter": "cna@vuldb.com", "references": ["https://vuldb.com/?id.214359", "https://www.jianshu.com/p/e977cda45d3c?v=1669360616628"], "cvelist": ["CVE-2022-4091"], "immutableFields": [], "lastseen": "2022-11-30T23:40:09", "viewCount": 10, "enchantments": {"score": {"value": 2.4, "vector": "NONE"}, "twitter": {"counter": 12, "tweets": [{"link": "https://twitter.com/www_sesin_at/status/1596100170072072193", "text": "New post from https://t.co/9KYxtdZjkl (CVE-2022-4091) has been published on https://t.co/6N5UFhC7db", "author": "www_sesin_at", "author_photo": "https://pbs.twimg.com/profile_images/958100963822329858/fb_N8h5n_400x400.jpg"}, {"link": "https://twitter.com/threatintelctr/status/1596080469660946432", "text": " NEW: CVE-2022-4091 A vulnerability was found in SourceCodester Canteen Management System. It has been classified as problematic. This affects the function query of the file food.php. The manipulation of the ar... (click for more) https://t.co/IBKInSeu55", "author": "threatintelctr", "author_photo": "https://pbs.twimg.com/profile_images/904224973987840000/dMy1x9Ho_400x400.jpg"}, {"link": "https://twitter.com/ColorTokensInc/status/1596080498794635264", "text": "Emerging Vulnerability Found CVE-2022-4091 - A vulnerability was found in SourceCodester Canteen Management System. It has been classified as problematic. This affects the function query of the file food.php. The manipulation of the argument ...\n\nSee https://t.co/yAgfTrTBa3", "author": "ColorTokensInc", "author_photo": "https://pbs.twimg.com/profile_images/1505854942875365380/yihNDIfa_400x400.jpg"}, {"link": "https://twitter.com/WolfgangSesin/status/1596100167953965062", "text": "New post from https://t.co/uXvPWJy6tj (CVE-2022-4091) has been published on https://t.co/bsld2XEtJf", "author": "WolfgangSesin", "author_photo": "https://pbs.twimg.com/profile_images/957011635369054208/Om3jbj7z_400x400.jpg"}, {"link": "https://twitter.com/threatmeter/status/1596078910025900034", "text": "CVE-2022-4091 | SourceCodester Canteen Management System food.php query product_name cross site scripting A vulnerability was found in SourceCodester Canteen Management System. It has been classified as problematic. This affects the function query of the\u2026 https://t.co/3BIYB9J2CM", "author": "threatmeter", "author_photo": "https://pbs.twimg.com/profile_images/637160052617379840/VTN_Q4tL_400x400.jpg"}, {"link": "https://twitter.com/WolfgangSesin/status/1598100905999699969", "text": "New post from https://t.co/uXvPWJy6tj (CVE-2022-4091 (canteen_management_system)) has been published on https://t.co/DhksCkkTnO", "author": "WolfgangSesin", "author_photo": "https://pbs.twimg.com/profile_images/957011635369054208/Om3jbj7z_400x400.jpg"}, {"link": "https://twitter.com/www_sesin_at/status/1598100909594234881", "text": "New post from https://t.co/9KYxtdZjkl (CVE-2022-4091 (canteen_management_system)) has been published on https://t.co/vW02kHoRT8", "author": "www_sesin_at", "author_photo": "https://pbs.twimg.com/profile_images/958100963822329858/fb_N8h5n_400x400.jpg"}]}, "vulnersScore": 2.4}, "_state": {"dependencies": 1669851695, "score": 1669851620, "twitter": 1669854631, "affected_software_major_version": 1671611801}, "_internal": {"score_hash": "9e434c6da6ad64f0cef5117569d3ef94"}, "cna_cvss": {"cna": "VulDB", "cvss": {"3": {"vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "score": 3.5}}}, "cpe": ["cpe:/a:canteen_management_system_project:canteen_management_system:-"], "cpe23": ["cpe:2.3:a:canteen_management_system_project:canteen_management_system:-:*:*:*:*:*:*:*"], "cwe": ["CWE-74", "CWE-79", "CWE-707"], "affectedSoftware": [{"cpeName": "canteen_management_system_project:canteen_management_system", "version": "-", "operator": "eq", "name": "canteen management system project canteen management system"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:canteen_management_system_project:canteen_management_system:-:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://vuldb.com/?id.214359", "name": "https://vuldb.com/?id.214359", "refsource": "MISC", "tags": ["Permissions Required", "Third Party Advisory"]}, {"url": "https://www.jianshu.com/p/e977cda45d3c?v=1669360616628", "name": "https://www.jianshu.com/p/e977cda45d3c?v=1669360616628", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}]}