Submit #43711: The simple and beautiful PHP shopping cart system has XSS vulnerability.info

TitleThe simple and beautiful PHP shopping cart system has XSS vulnerability.
DescriptionSimple and beautiful PHP shopping cart system CMS exist Cross-site scripting Vulnerability .The input variables are not protected and output is directly output. Attackers can construct malicious code to steal user and administrator cookies. Vulnerability file location:/mkshope/login.php look at this source code ``` if (isset($_GET['status'])) { $id=$_GET['status']; $msg=$_GET['msg']; <strong>Error:</strong> &nbsp; <?php echo $msg; ?>! ``` There is no protection for the `msg` here. The `msg` variable is directly output here. Here we can insert XSS statements to steal user cookies and other information. The construction statement is as follows ``` ?status=error&msg=<script>alert(document.cookie)</script> ``` https://s1.ax1x.com/2022/08/13/vNcnHA.png Source link https://www.sourcecodester.com/php/12579/simple-and-nice-shopping-cart-script.html
Source⚠️ https://www.sourcecodester.com/php/12579/simple-and-nice-shopping-cart-script.html
Userqidian (ID 30810)
Submission08/14/2022 11:36 (2 years ago)
Moderation08/14/2022 12:31 (55 minutes later)
StatusAccepted
VulDB Entry206401

Interested in the pricing of exploits?

See the underground prices here!