A Reflected XSS vulnerability in page.php #3
The vulnerability exists due to insufficient filtration of user-supplied data in "model" HTTP parameter that will be passed to " symetrie-master/app/commands/page.php". The infected source code is line 18, there is no protection on $_GET['model'], if it contains evil js code, line 52 will trigger untrusted code to be executed on the browser side.
So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil.
Discoverer: ADLab of Venustech