제출 #42809: Student-Admission-Reflection Xss정보

제목Student-Admission-Reflection Xss
설명Payload:index.php?a=edit&eid=8</h3><script>alert(1)</script> Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values. Code ``` <div class="form-area"> <div class="container"> <div class="row"> <div class="col-md-12"> <div class="section-title"> <h3 id="et">Edit the ID: <?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3> ``` url:https://github.com/badboycxcc/Student-Admission-Xss
원천⚠️ https://github.com/badboycxcc/Student-Admission-Xss
사용자
 cxaqhq (UID 23728)
제출2022. 08. 04. AM 07:58 (4 연령 ago)
모더레이션2022. 08. 04. AM 08:05 (7 minutes later)
상태수락
VulDB 항목205572 [SourceCodester Online Admission System index.php eid 크로스 사이트 스크립팅]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!