Submit #425397: PHPGurukul Boat Booking System 1.0 Cross Site Scriptinginfo

TitlePHPGurukul Boat Booking System 1.0 Cross Site Scripting
Descriptionbook-boat.php and /admin/all-booking.php is vulnerable to the tested XSS payload: %3cIMG%20%22%22%22%3e%3cSCRIPT%3ealert(%22XSS%22)%3c%2fSCRIPT%3e%22%3e. This string is encoded and when decoded, it attempts to inject a script into the webpage: <IMG """"><SCRIPT>alert("XSS")</SCRIPT>"> Application does not properly sanitize or validate the phone_number input, this script could be executed in the user's browser, leading to an XSS attack.
Source⚠️ https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_book_boat_xss.md
User
 jadu101 (UID 70632)
Submission10/17/2024 05:23 AM (2 months ago)
Moderation10/18/2024 09:17 PM (2 days later)
StatusAccepted
VulDB Entry280941 [PHPGurukul Boat Booking System 1.0 Book a Boat Page book-boat.php?bid=1 phone_number cross site scripting]
Points20

Do you need the next level of professionalism?

Upgrade your account now!