[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #425397: PHPGurukul Boat Booking System 1.0 Cross Site Scriptinginfo

TitlePHPGurukul Boat Booking System 1.0 Cross Site Scripting
Descriptionbook-boat.php and /admin/all-booking.php is vulnerable to the tested XSS payload: %3cIMG%20%22%22%22%3e%3cSCRIPT%3ealert(%22XSS%22)%3c%2fSCRIPT%3e%22%3e. This string is encoded and when decoded, it attempts to inject a script into the webpage: <IMG """"><SCRIPT>alert("XSS")</SCRIPT>"> Application does not properly sanitize or validate the phone_number input, this script could be executed in the user's browser, leading to an XSS attack.
Source⚠️ https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_book_boat_xss.md
User
 jadu101 (UID 70632)
Submission17.10.2024 05:23 (vor 5 Monaten)
Moderation18.10.2024 21:17 (2 days later)
StatusAkzeptiert
VulDB Entry280941 [PHPGurukul Boat Booking System 1.0 Book a Boat Page book-boat.php?bid=1 phone_number Cross Site Scripting]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!