提交 #287778: keerti1924 Online-Book-Store-Website 1.0 Stored XSS信息

标题keerti1924 Online-Book-Store-Website 1.0 Stored XSS
描述The 'signup.php' script in keerti1924's Online-Book-Store-Website is vulnerable to Stored Cross-Site Scripting (XSS) attacks. Exploiting this flaw, attackers can inject malicious scripts into the application, potentially compromising user data security. By crafting a payload in the 'name' parameter during account registration, attackers can execute arbitrary commands within other users' browsers, leading to various malicious activities such as session hijacking and unauthorized access to sensitive information. To mitigate this vulnerability, developers should implement robust input validation and output encoding mechanisms to sanitize user inputs effectively and prevent XSS attacks. Additionally, enforcing strict Content Security Policies (CSP) can further enhance protection against such security risks.
来源⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md
用户
 nochizplz (UID 64302)
提交2024-02-25 17時24分 (2 年前)
管理2024-03-07 15時35分 (11 days later)
状态已接受
VulDB条目256040 [keerti1924 Online-Book-Store-Website 1.0 /signup.php 名称 跨网站脚本]
积分20

Do you know our Splunk app?

Download it now for free!