Title | phpgurukul Land Record System 1.0.0.0 Cross Site Scripting |
---|
Description | In the 'edit-propertytype.php' file, in the path '/landrecordsys/admin/edit-propertytype.php?editid=1' an unrestricted Cross-Site Scripting (XSS) vulnerability and injection attacks exist in the "Land Record System" system, specifically targeting the 'Property type' parameter. The function executes the user-supplied parameter without validation. Malicious attackers can leverage this vulnerability to access sensitive client information.
script: <a href=javascript:alert(document.cookie)>Click Here</a>
The inserted payload is reflected in the path: '/landrecordsys/admin/manage-propertytype.php' |
---|
Source | ⚠️ https://phpgurukul.com/land-record-system-using-php-and-mysql/ |
---|
User | Havook (UID 71104) |
---|
Submission | 12/30/2024 05:08 PM (3 months ago) |
---|
Moderation | 12/31/2024 09:58 AM (17 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 289829 [PHPGurukul Land Record System 1.0 edit-propertytype.php Property Type cross site scripting] |
---|
Points | 20 |
---|