| Название | Student-Admission-Reflection Xss |
|---|
| Описание | Payload:index.php?a=edit&eid=8</h3><script>alert(1)</script>
Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values.
Code
```
<div class="form-area">
<div class="container">
<div class="row">
<div class="col-md-12">
<div class="section-title">
<h3 id="et">Edit the ID:
<?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3>
```
url:https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| Источник | ⚠️ https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| Пользователь | cxaqhq (UID 23728) |
|---|
| Представление | 04.08.2022 07:58 (4 лет назад) |
|---|
| Модерация | 04.08.2022 08:05 (7 minutes later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 205572 [SourceCodester Online Admission System index.php eid межсайтовый скриптинг] |
|---|
| Баллы | 20 |
|---|