| タイトル | code-projects School Fees Payment System 1.0 Cross Site Scripting |
|---|
| 説明 | During the security review of "School Fees Payment System", I discovered a Stored Cross-Site Scripting vulnerability in the "/student.php" file. This vulnerability stems from insufficient user input validation of the 'sname', 'contact', 'about', 'emailid', 'transcation_remark' parameters, allowing attackers to inject malicious front-end code. Therefore, attackers can forge input values, thereby manipulating front-end code and performing the set behaviors in the user's browser, such as stealing the user's cookies. Immediate remedial measures are needed to ensure system security and protect data integrity. |
|---|
| ソース | ⚠️ https://github.com/tuooo/CVE/issues/18 |
|---|
| ユーザー | DS_Leo (UID 86084) |
|---|
| 送信 | 2025年06月20日 18:00 (10 月 ago) |
|---|
| モデレーション | 2025年06月24日 10:11 (4 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 313741 [code-projects School Fees Payment System 1.0 /student.php sname/contact/about/emailid/transcation_remark クロスサイトスクリプティング] |
|---|
| ポイント | 20 |
|---|