Title | Canteen Management System (brand.php) is vulnerable to a Cross-site scripting(Persistent) |
---|
Description | url: youthappam/brand.php
payload :
<script>alert(11)</script>
Abstract:
Line 50 of brand.php sends unvalidated data to a web browser, which can result in the browser executing malicious code.
Explanation:
Cross-site scripting (XSS) vulnerabilities occur when:
1. Data enters a web application through an untrusted source. In the case of persistent (also known as stored) XSS, the untrusted source is typically a database or other back-end data store, while in the case of reflected XSS it is typically a web request.
In this case, the data enters at query() in brand.php at line 7.
2. The data is included in dynamic content that is sent to a web user without being validated.
In this case, the data is sent at builtin_echo() in brand.php at line 50.
Download Code:
https://www.sourcecodester.com/php/15688/canteen-management-system-project-source-code-php.html |
---|
Source | ⚠️ https://www.jianshu.com/p/3efa724c789d?v=1669372054033 |
---|
User | sanc (ID 36508) |
---|
Submission | 2022年11月25日 11:28 (2 years ago) |
---|
Moderation | 2022年11月30日 14:37 (5 days later) |
---|
Status | 承諾済み |
---|
VulDB Entry | 214595 |
---|