inTxnStatus. Php, code line 17: ORDER_ The variable $ORDER whose ID is input by the user and assigned through POST request_ The ID is then directly output in line 44 of the code. Value="">There is no filtering. That is to say, we can construct a closed javascript statement to pop up the page. However, we can bypass the character limit at the front end, which is very simple
Building environment:Apache2.4.49;MySQL5.7.26;PHP7.3.4
1.Movie Ticket Booking System-PHP XSS vulnerability
inTxnStatus. Php, code line 17: ORDER_ The variable $ORDER whose ID is input by the user and assigned through POST request_ The ID is then directly output in line 44 of the code. Value="">There is no filtering. That is to say, we can construct a closed javascript statement to pop up the page. However, we can bypass the character limit at the front end, which is very simple
PAYLOAD:
Then check the website source code:
The text was updated successfully, but these errors were encountered: