| 标题 | keerti1924 Online-Book-Store-Website 1.0 Stored XSS |
|---|
| 描述 | The 'signup.php' script in keerti1924's Online-Book-Store-Website is vulnerable to Stored Cross-Site Scripting (XSS) attacks. Exploiting this flaw, attackers can inject malicious scripts into the application, potentially compromising user data security. By crafting a payload in the 'name' parameter during account registration, attackers can execute arbitrary commands within other users' browsers, leading to various malicious activities such as session hijacking and unauthorized access to sensitive information. To mitigate this vulnerability, developers should implement robust input validation and output encoding mechanisms to sanitize user inputs effectively and prevent XSS attacks. Additionally, enforcing strict Content Security Policies (CSP) can further enhance protection against such security risks. |
|---|
| 来源 | ⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md |
|---|
| 用户 | nochizplz (UID 64302) |
|---|
| 提交 | 2024-02-25 17時24分 (2 年前) |
|---|
| 管理 | 2024-03-07 15時35分 (11 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 256040 [keerti1924 Online-Book-Store-Website 1.0 /signup.php 名称 跨网站脚本] |
|---|
| 积分 | 20 |
|---|