提交 #42809: Student-Admission-Reflection Xss信息

标题Student-Admission-Reflection Xss
描述Payload:index.php?a=edit&eid=8</h3><script>alert(1)</script> Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values. Code ``` <div class="form-area"> <div class="container"> <div class="row"> <div class="col-md-12"> <div class="section-title"> <h3 id="et">Edit the ID: <?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3> ``` url:https://github.com/badboycxcc/Student-Admission-Xss
来源⚠️ https://github.com/badboycxcc/Student-Admission-Xss
用户
 cxaqhq (UID 23728)
提交2022-08-04 07時58分 (4 年前)
管理2022-08-04 08時05分 (7 minutes later)
状态已接受
VulDB条目205572 [SourceCodester Online Admission System index.php eid 跨网站脚本]
积分20

Interested in the pricing of exploits?

See the underground prices here!