needyamin Library Card System Registration Page signup.php cross site scripting
Library-Card-System 1.0 存在存储型跨站脚本漏洞, signup.php 中的用户输入未验证或清理,允许远程攻击者通过注册携带 XSS 有效载荷,在 admindashboard.php 和 card.php 中执行恶意脚本。 2025-2-24 21:1:13 Author: cxsecurity.com(查看原文) 阅读量:4 收藏

Title of the Vulnerability: Library-Card-System | Stored Cross Site Scripting In signup.php | Finder & Exploit Owner: Maloy Roy Orko Vulnerability Class: Stored Cross Site Scripting Product Name: Library-Card-System Vendor: Needyamin Type: Library-Card-System Vulnerable Product Link: https://github.com/needyamin/Library-Card-System/ Vendor Link: https://github.com/needyamin/ Affected Components: /signup.php In Short: Stored Cross Site Scripting Vulnerability Found By Maloy Roy Orko At /signup.php In Library-Card-System 1.0(Vendor: Needyamin).The Sign Up Fields In (/signup.php) Don't Validate Or Sanitize The User Inputs Even No Defense Against XSS.So,The Fields Can Be Used To Execute Malicious JavaScript Commands. Suggested Description: Stored Cross Site Scripting in "/signup.php" in "Library-Card-System application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "To Execute Malicious JavaScript Commands Because User Can Register With XSS Payloads & JavaScript Codes" via "/admindashboard.php & card.php". Attack Vectors: To exploit vulnerability,he has to register with xss payloads in signup fields like name,book in /signup.php.Thus, Attacker can execute malicious JavaScript codes in /admindashboard.php & /card.php! Detailed Blog: https://www.websecurityinsights.my.id/2025/01/library-card-system-stored-cross-site.html?m=1

References:

https://www.websecurityinsights.my.id/2025/01/library-card-system-stored-cross-site.html?m=1




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025020016
如有侵权请联系:admin#unsafe.sh