提出 #777815: code-projects The Social Networking Site in PHP 1.0 Cross Site Scripting情報

タイトルcode-projects The Social Networking Site in PHP 1.0 Cross Site Scripting
説明The Social Networking Site in PHP version 1.0 is affected by a Stored Cross-Site Scripting (XSS) vulnerability in the post content functionality. The issue occurs because the application fails to properly sanitize or encode user-controlled input before storing it in the database and rendering it in the HTML response. The vulnerable code renders the post content directly: <div class="alert"><?php echo $row['content']; ?></div> The content parameter is stored in the post database table and later displayed in the social feed without output encoding. Because the value is inserted directly into the HTML page, malicious HTML or JavaScript code may be interpreted and executed by the browser. An attacker can exploit this vulnerability by submitting a specially crafted payload when creating a post. The injected payload becomes persistent in the database and is executed whenever the affected page is viewed by other users. Example payload used during testing: <details/open/ontoggle=prompt(origin)> Successful exploitation allows attackers to execute arbitrary JavaScript within the context of the application, which may lead to session hijacking, cookie theft, or performing actions on behalf of authenticated users.
ソース⚠️ https://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/Stored%20Cross-Site%20Scripting%20(XSS)%20in%20PHP%20Social%20Networking%20Site.md
ユーザー
 AhmadMarzook (UID 96211)
送信2026年03月11日 18:06 (21 日 ago)
モデレーション2026年03月27日 09:51 (16 days later)
ステータス承諾済み
VulDBエントリ353856 [code-projects Social Networking Site 1.0 Alert /home.php content クロスサイトスクリプティング]
ポイント20

Interested in the pricing of exploits?

See the underground prices here!