| 제목 | Code-projects Student File Management System v1.0 Stored XSS vulnerability |
|---|
| 설명 | A storage-type XSS vulnerability was found in the "update_user.php" file of the "Student File Management System" project. Root Cause Because update_user.php does not escape, clean or parameterize the POST request data submitted by the user, when the attacker submits a malicious Payload in the firstname, lastname field (for example,"<img src=x onerror=alert(1)>"), the code does not block it and permanently stores it in the "user" table of the database. When “user.php” reads the malicious firstname, lastname data in the database, and “echo $fetch['firstname']、echo $fetch['lastname']” to an HTML page as-is, the browser will <script>treat the HTML tag and execute its content. Immediate corrective actions are essential to safeguard system security and uphold data integrity. |
|---|
| 원천 | ⚠️ https://github.com/jjjjj-zr/jjjjjzr15/issues/1 |
|---|
| 사용자 | jjzr (UID 93346) |
|---|
| 제출 | 2025. 12. 12. AM 06:50 (4 개월 ago) |
|---|
| 모더레이션 | 2025. 12. 13. PM 02:28 (1 day later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 336394 [code-projects Student File Management System 1.0 Update User Page /admin/update_user.php 크로스 사이트 스크립팅] |
|---|
| 포인트들 | 20 |
|---|