| 제목 | code-projects Human Resource Integrated System published August 1, 2025 Cross Site Scripting |
|---|
| 설명 | Summary
The vulnerability exists in the insert-and-view component due to improper input validation and output encoding.
Root Cause
The application fails to properly sanitize and encode user-controlled input before rendering it to the client-side in action.php. Specifically, user input from $_POST['content'] is directly output via PHP's echo statement without encoding.
Example vulnerable code snippet:
echo $row['msg'];
Reproduction
Navigate to the comment submission form.
Submit the following malicious payload:
<script>alert('XSS')</script>
The payload will be executed in the browser, demonstrating a successful XSS attack.
Impact
This vulnerability allows remote attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, defacement, or further client-side exploitation. |
|---|
| 원천 | ⚠️ https://github.com/shenxianyuguitian/hris-vuln-XSS/blob/main/README.md |
|---|
| 사용자 | xuanyuesanshi (UID 88126) |
|---|
| 제출 | 2025. 08. 01. AM 08:15 (9 개월 ago) |
|---|
| 모더레이션 | 2025. 08. 02. AM 08:54 (1 day later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 318600 [code-projects Human Resource Integrated System 1.0 action.php content 크로스 사이트 스크립팅] |
|---|
| 포인트들 | 20 |
|---|