| Título | Student-Admission-Reflection Xss |
|---|
| Descrição | Payload:index.php?a=edit&eid=8</h3><script>alert(1)</script>
Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values.
Code
```
<div class="form-area">
<div class="container">
<div class="row">
<div class="col-md-12">
<div class="section-title">
<h3 id="et">Edit the ID:
<?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3>
```
url:https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| Fonte | ⚠️ https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| Utilizador | cxaqhq (UID 23728) |
|---|
| Submissão | 04/08/2022 07h58 (há 4 anos) |
|---|
| Moderação | 04/08/2022 08h05 (7 minutes later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 205572 [SourceCodester Online Admission System index.php eid Script de Site Cruzado] |
|---|
| Pontos | 20 |
|---|