제출 #626792: code-projects Human Resource Integrated System published August 1, 2025 Cross Site Scripting정보

제목code-projects Human Resource Integrated System published August 1, 2025 Cross Site Scripting
설명Summary The vulnerability exists in the insert-and-view component due to improper input validation and output encoding. Root Cause The application fails to properly sanitize and encode user-controlled input before rendering it to the client-side in action.php. Specifically, user input from $_POST['content'] is directly output via PHP's echo statement without encoding. Example vulnerable code snippet: echo $row['msg']; Reproduction Navigate to the comment submission form. Submit the following malicious payload: <script>alert('XSS')</script> The payload will be executed in the browser, demonstrating a successful XSS attack. Impact This vulnerability allows remote attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, defacement, or further client-side exploitation.
원천⚠️ https://github.com/shenxianyuguitian/hris-vuln-XSS/blob/main/README.md
사용자
 xuanyuesanshi (UID 88126)
제출2025. 08. 01. AM 08:15 (9 개월 ago)
모더레이션2025. 08. 02. AM 08:54 (1 day later)
상태수락
VulDB 항목318600 [code-projects Human Resource Integrated System 1.0 action.php content 크로스 사이트 스크립팅]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!