| 标题 | PHPGurukul Directory Management System 2.0 Cross Site Scripting |
|---|
| 描述 | The POST-based XSS vulnerability in Directory Management System's search functionality allows injecting JavaScript payloads through the "searchdata" parameter. Unlike GET-based XSS, attackers must trick users into submitting a malicious form, but the severity remains critical due to modern attack vectors like:
1.Hosting malicious form on phishing pages
2.Using XMLHttpRequest to auto-submit POST data
3.Exploiting through iframe injections |
|---|
| 来源 | ⚠️ https://github.com/Schatten-42/MyCVE/issues/4 |
|---|
| 用户 | -Schatten- (UID 85151) |
|---|
| 提交 | 2025-05-11 16時53分 (12 月前) |
|---|
| 管理 | 2025-05-16 21時01分 (5 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 309404 [PHPGurukul Directory Management System 2.0 /searchdata.php searchdata 跨网站脚本] |
|---|
| 积分 | 20 |
|---|