Title | needyamin image_gallery 1.0 Cross Site Scripting |
---|
Description | Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko
Vulnerable Product:
https://github.com/needyamin/image_gallery
Vendor Link:
https://github.com/needyamin/
Vendor: needyamin
Product Name: image_gallery
Type: Image Gallery Management System
????????????????????
Title of the Vulnerability: Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko
Finder & Exploit Owner: Maloy Roy Orko
Vulnerability Class: Reflected Cross Site Scripting
Product Name: image_gallery
Vendor:
needyamin
Vendor Link:
https://github.com/needyamin/
Vulnerable Product Link: https://github.com/needyamin/image_gallery/
Affected Components:
view.php?username=
Suggested Description:
Reflected XSS in "view.php?username=" in "image_gallery application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "to execute malicious JavaScript code via XSS as no validations are provided and can get cookies of admin" via "view.php?username=".
Attack Vectors:
To exploit vulnerability,he has to input XSS exploits via view.php?username= and then he can give the links to their targets even Admin and when targets click it! Attacker can gain admin cookie and then he can login admin and as the file upload isn't protected can hijack the whole server too!He can even execute malicious JavaScript codes into visitors browser via this vulnerability.
Detailed Blog:
https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html
|
---|
Source | ⚠️ https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html |
---|
User | MaloyRoyOrko (UID 79572) |
---|
Submission | 01/15/2025 06:18 PM (5 months ago) |
---|
Moderation | 01/26/2025 04:40 PM (11 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 293481 [needyamin image_gallery 1.0 /view.php Username cross site scripting] |
---|
Points | 20 |
---|