Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko
Image_Gallery应用中的view.php?username=参数存在反射型XSS漏洞,由Maloy Roy Orko发现。攻击者可注入恶意脚本窃取管理员cookie并控制服务器。 2025-2-24 21:0:26 Author: cxsecurity.com(查看原文) 阅读量:5 收藏

Title of the Vulnerability: Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko Product Name: image_gallery Product Type: Image Gallery Management System Finder & Exploit Owner: Maloy Roy Orko Vulnerability Class: Reflected Cross Site Scripting Vendor: needyamin Vendor Link: https://github.com/needyamin/ Vulnerable Product Link: https://github.com/needyamin/image_gallery/ Affected Components: view.php?username= Suggested Description: Reflected XSS in "view.php?username=" in "image_gallery application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "to execute malicious JavaScript code via XSS as no validations are provided and can get cookies of admin" via "view.php?username=". Attack Vectors: To exploit vulnerability,he has to input XSS exploits via view.php?username= and then he can give the links to their targets even Admin and when targets click it! Attacker can gain admin cookie and then he can login admin and as the file upload isn't protected can hijack the whole server too!He can even execute malicious JavaScript codes into visitors browser via this vulnerability. Detailed Blog: https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025020014
如有侵权请联系:admin#unsafe.sh