Soumettre #290794: sourcecodester Petrol pump management software 1.0 Stored XSSinformation

Titresourcecodester Petrol pump management software 1.0 Stored XSS
DescriptionThe Petrol Pump Management Software on SOURCECODESTER contains a Stored Cross-Site Scripting (XSS) vulnerability within its /admin/app/profile_crud.php component. This vulnerability arises from the application's failure to sanitize user inputs for fields such as username, email, and mobileno before updating them in the database. Attackers can exploit this flaw by crafting malicious inputs that include JavaScript code, which will be executed in the context of a user's session when viewed. The demonstrated proof of concept shows how a simple POST request can inject JavaScript into the username field, triggering an alert box when the malicious content is interacted with or displayed. This issue highlights the critical need for validating and encoding user inputs to prevent XSS attacks, which can lead to unauthorized actions being performed on behalf of the user, access to sensitive information, and other security
La source⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md
Utilisateur
 nochizplz (UID 64302)
Soumission29/02/2024 10:40 (il y a 2 ans)
Modérer01/03/2024 07:54 (21 hours later)
StatutAccepté
Entrée VulDB255378 [SourceCodester Petrol Pump Management Software 1.0 profile_crud.php Nom d'utilisateur cross site scripting]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!