Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reflected XSS in registration-sub-menu.php #410

Closed
prodigysml opened this issue Jul 19, 2018 · 0 comments
Closed

Reflected XSS in registration-sub-menu.php #410

prodigysml opened this issue Jul 19, 2018 · 0 comments

Comments

@prodigysml
Copy link

The Issue

Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim's browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim.

Where the Issue Occurred

The following code shows that the $_GET['registration'] variable is reflected to the victim's browser without any input validation, leading to reflected XSS:

<li><a href="<?php print $globalURL; ?>/registration/<?php print $_GET['registration']; ?>" <?php if (strtolower($current_page) == "registration-detailed"){ print 'class="active"'; } ?>><?php echo _("Detailed"); ?></a></li>

An example payload for the registration variable is given below:

"><img src=x onerror=alert(1)>
@Ysurac Ysurac closed this as completed in 22b09a3 Jul 19, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant