| 标题 | Student-Admission-Reflection Xss |
|---|
| 描述 | Payload:index.php?a=edit&eid=8</h3><script>alert(1)</script>
Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values.
Code
```
<div class="form-area">
<div class="container">
<div class="row">
<div class="col-md-12">
<div class="section-title">
<h3 id="et">Edit the ID:
<?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3>
```
url:https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| 来源 | ⚠️ https://github.com/badboycxcc/Student-Admission-Xss |
|---|
| 用户 | cxaqhq (UID 23728) |
|---|
| 提交 | 2022-08-04 07時58分 (4 年前) |
|---|
| 管理 | 2022-08-04 08時05分 (7 minutes later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 205572 [SourceCodester Online Admission System index.php eid 跨网站脚本] |
|---|
| 积分 | 20 |
|---|