Tag
#php
Using a crafted POST request, an unprivileged, registered user is able to retrieve information about other users' personal system profiles. ### Impact Disclosure of private system profiles: Platform, OS, OS version, Description. ### Patches Work in progress ### Workarounds None ### References https://mantisbt.org/bugs/view.php?id=34640
Student Management System version 1.0 suffers from an insecure cookie handling vulnerability.
Student Enrollment version 1.0 suffers from an arbitrary file upload vulnerability.
Sistem Penyewaan Baju atau Pakaian Berbasis Web version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Simple Student Quarterly Result / Grade System version 1.0 suffers from an ignored default credential vulnerability.
Simple Responsive Tourism Website version 1.0 suffers from a cross site request forgery vulnerability.
Simple Music Management System version 1.0 suffers from add administrator and cross site request forgery vulnerabilities.
Sample Blog Site version 1.0 suffers from cross site scripting and remote file inclusion vulnerabilities.
### Summary If values passed to a `ColorColumn` or `ColumnEntry` are not valid and contain a specific set of characters, applications are vulnerable to Cross-site Scripting (XSS) attack against a user who opens a page on which a color column or entry is rendered. Versions of Filament from v3.0.0 through v3.2.114 are affected. Please upgrade to Filament [v3.2.115](https://github.com/filamentphp/filament/releases/tag/v3.2.115). ### PoC > *PoC will be published in a few weeks, once developers have had a chance to upgrade their apps.* ### Response This vulnerability (in `ColorColumn` only) was reported by @sv-LayZ, who reported the issue and patched the issue during the evening of 25/09/2024. Thank you Mattis. The review process concluded on 27/09/2024, which revealed the issue was also present in `ColorEntry`. This was fixed the same day and Filament [v3.2.115](https://github.com/filamentphp/filament/releases/tag/v3.2.115) followed. > *An explanation of the fix will be published ...
Simple Online Banking System version 1.0 suffers from an ignored default credential vulnerability.