Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reflected cross site scripting found (XSS) #29

riteshgupta1993 opened this issue Aug 15, 2018 · 1 comment

Reflected cross site scripting found (XSS) #29

riteshgupta1993 opened this issue Aug 15, 2018 · 1 comment


Copy link

@riteshgupta1993 riteshgupta1993 commented Aug 15, 2018

• Fiendura version: 2.0.7
• PHP Version: 5.6.35
• Apache Version: 2.4.33
• Operating system: microsoft windows v10

VULNERABILITY TYPE: cross-site scripting.

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.

An attacker can use XSS to send a malicious script to an unsuspecting user. The end user's browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source; the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page.


1: login in Fiendura.
2: Go for creating a new page by clicking on the new page.
3: In the tags parameter, type the malicious javascript /default.aspx#"><img src=x onerror=prompt('0');>
4: The malicious javascript will be reflected in the browser.


Vulnerable URL:
Vulnerable parameter: Tags
Malicious script: /default.aspx#"><img src=x onerror=prompt('0');>

1: enter the malicious javascript in the Tags parameter.

2: after entering the payload an XSS prompt will be reflected on the browser.
Submitted: Ritesh Kumar

Copy link

@Halamadrid777 Halamadrid777 commented Mar 12, 2019

Great find


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
None yet
None yet
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
2 participants