| عنوان | Student-Admission-Reflection Xss |
|---|
| الوصف | Payload:index.php?a=edit&eid=8</h3><script>alert(1)</script>
Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values.
Code
```
<div class="form-area">
<div class="container">
<div class="row">
<div class="col-md-12">
<div class="section-title">
<h3 id="et">Edit the ID:
<?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3>
```
url:https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| المصدر | ⚠️ https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| المستخدم | cxaqhq (UID 23728) |
|---|
| ارسال | 04/08/2022 07:58 AM (4 سنوات منذ) |
|---|
| الاعتدال | 04/08/2022 08:05 AM (7 minutes later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 205572 [SourceCodester Online Admission System index.php eid البرمجة عبر المواقع] |
|---|
| النقاط | 20 |
|---|