Submit #472185: phpgurukul Land Record System 1.0.0.0 Cross Site Scriptinginfo

Titlephpgurukul Land Record System 1.0.0.0 Cross Site Scripting
DescriptionIn the 'edit-propertytype.php' file, in the path '/landrecordsys/admin/edit-propertytype.php?editid=1' an unrestricted Cross-Site Scripting (XSS) vulnerability and injection attacks exist in the "Land Record System" system, specifically targeting the 'Property type' parameter. The function executes the user-supplied parameter without validation. Malicious attackers can leverage this vulnerability to access sensitive client information. script: <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a> The inserted payload is reflected in the path: '/landrecordsys/admin/manage-propertytype.php'
Source⚠️ https://phpgurukul.com/land-record-system-using-php-and-mysql/
User
 Havook (UID 71104)
Submission12/30/2024 05:08 PM (3 months ago)
Moderation12/31/2024 09:58 AM (17 hours later)
StatusAccepted
VulDB Entry289829 [PHPGurukul Land Record System 1.0 edit-propertytype.php Property Type cross site scripting]
Points20

Do you know our Splunk app?

Download it now for free!