| 제목 | Student-Admission-Reflection Xss |
|---|
| 설명 | Payload:index.php?a=edit&eid=8</h3><script>alert(1)</script>
Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values.
Code
```
<div class="form-area">
<div class="container">
<div class="row">
<div class="col-md-12">
<div class="section-title">
<h3 id="et">Edit the ID:
<?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3>
```
url:https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| 원천 | ⚠️ https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| 사용자 | cxaqhq (UID 23728) |
|---|
| 제출 | 2022. 08. 04. AM 07:58 (4 연령 ago) |
|---|
| 모더레이션 | 2022. 08. 04. AM 08:05 (7 minutes later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 205572 [SourceCodester Online Admission System index.php eid 크로스 사이트 스크립팅] |
|---|
| 포인트들 | 20 |
|---|