Describe the bug
Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim.
To Reproduce
Steps to reproduce the behavior:
Access to the following link: http://[localhost]/getID3/demos/demo.mysqli.php?encoderoptionsdistribution=1&showtagfiles=%3Cscript%3Ealert(1)%3C/script%3E
Boom!
Where the Issue Occurred
The code below displays the user-controlled parameter showtagfiles without sufficient sanitization:
Describe the bug
Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim.
To Reproduce
Steps to reproduce the behavior:
Where the Issue Occurred
The code below displays the user-controlled parameter
showtagfileswithout sufficient sanitization:getID3/demos/demo.mysqli.php
Line 1500 in 4e02ed0
The text was updated successfully, but these errors were encountered: