CVE-2026-3412

4.3 MEDIUM

📋 TL;DR

A cross-site scripting (XSS) vulnerability in itsourcecode University Management System 1.0 allows attackers to inject malicious scripts via the 'dt' parameter in /att_single_view.php. This affects all users of this specific software version who access the vulnerable page. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • itsourcecode University Management System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version 1.0 of this software. The vulnerability exists in the default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or deliver malware to visitors.

🟠

Likely Case

Attackers will typically use this to steal session cookies or credentials, potentially leading to account takeover and unauthorized access to university management data.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized before execution, preventing any impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and requires minimal technical skill to execute. No authentication is required to exploit this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://itsourcecode.com/

Restart Required: No

Instructions:

No official patch is available. Check the vendor website for updates or consider alternative solutions.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of the 'dt' parameter in /att_single_view.php to remove or encode malicious scripts.

Modify /att_single_view.php to sanitize input: $dt = htmlspecialchars($_GET['dt'], ENT_QUOTES, 'UTF-8');

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious requests containing script payloads.

🧯 If You Can't Patch

  • Disable or restrict access to /att_single_view.php if not essential.
  • Implement Content Security Policy (CSP) headers to restrict script execution sources.

🔍 How to Verify

Check if Vulnerable:

Test by accessing /att_single_view.php?dt=<script>alert('XSS')</script> and checking if the script executes in the browser.

Check Version:

Check the software documentation or configuration files for version information, typically in README or about pages.

Verify Fix Applied:

After applying fixes, test the same payload to ensure no script execution occurs and input is properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /att_single_view.php containing script tags or JavaScript in the 'dt' parameter.
  • Unusual patterns of requests to the vulnerable endpoint.

Network Indicators:

  • Incoming requests with malicious script payloads in query parameters.

SIEM Query:

source="web_server" AND uri_path="/att_single_view.php" AND query_string="*<script>*"

🔗 References

📤 Share & Export