Submeter #287778: keerti1924 Online-Book-Store-Website 1.0 Stored XSSinformação

Títulokeerti1924 Online-Book-Store-Website 1.0 Stored XSS
DescriçãoThe 'signup.php' script in keerti1924's Online-Book-Store-Website is vulnerable to Stored Cross-Site Scripting (XSS) attacks. Exploiting this flaw, attackers can inject malicious scripts into the application, potentially compromising user data security. By crafting a payload in the 'name' parameter during account registration, attackers can execute arbitrary commands within other users' browsers, leading to various malicious activities such as session hijacking and unauthorized access to sensitive information. To mitigate this vulnerability, developers should implement robust input validation and output encoding mechanisms to sanitize user inputs effectively and prevent XSS attacks. Additionally, enforcing strict Content Security Policies (CSP) can further enhance protection against such security risks.
Fonte⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md
Utilizador
 nochizplz (UID 64302)
Submissão25/02/2024 17h24 (há 2 anos)
Moderação07/03/2024 15h35 (11 days later)
EstadoAceite
Entrada VulDB256040 [keerti1924 Online-Book-Store-Website 1.0 /signup.php Nome Script de Site Cruzado]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!