| Title | Project Worlds Simple Web Based Chat Application 1.0 Cross Site Scripting |
|---|
| Description |
index.php is vulnerable to the tested XSS payload: %3cIMG%20%22%22%22%3e%3cSCRIPT%3ealert(%22XSS%22)%3c%2fSCRIPT%3e%22%3e. This string is encoded and when decoded, it attempts to inject a script into the webpage: <IMG """"><SCRIPT>alert("XSS")</SCRIPT>">
Application does not properly sanitize or validate the phone_number input, this script could be executed in the user's browser, leading to an XSS attack. |
|---|
| Source | ⚠️ https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_xss.md |
|---|
| User | jadu101 (UID 70632) |
|---|
| Submission | 10/26/2024 20:23 (1 Year ago) |
|---|
| Moderation | 10/27/2024 08:14 (13 hours later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 281984 [Project Worlds Simple Web-Based Chat Application 1.0 /index.php Name/Comment cross site scripting] |
|---|
| Points | 20 |
|---|