美文网首页
Canteen Management System (brand

Canteen Management System (brand

作者: migrate_ | 来源:发表于2022-11-25 18:27 被阅读0次

    Canteen Management System (brand.php) is vulnerable to a Cross-site scripting(Persistent)

    url: youthappam/brand.php

    Abstract:

    Line 50 of brand.php sends unvalidated data to a web browser, which can result in the browser executing malicious code.

    Explanation:

    Cross-site scripting (XSS) vulnerabilities occur when:

    1. Data enters a web application through an untrusted source. In the case of persistent (also known as stored) XSS, the untrusted source is typically a database or other back-end data store, while in the case of reflected XSS it is typically a web request.

    In this case, the data enters at query() in brand.php at line 7.

    1. The data is included in dynamic content that is sent to a web user without being validated.

    In this case, the data is sent at builtin_echo() in brand.php at line 50.

    0.png 1.png 2.png 3.png 4.png 5.png

    It is clear that the application doesn't perform data validation and trust user-supplied data, we can use the below XSS payload as input which may be stored in the application.

    payload :

    <script>alert(11)</script>
    

    相关文章

      网友评论

          本文标题:Canteen Management System (brand

          本文链接:https://www.haomeiwen.com/subject/omyxfdtx.html