You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello:
I have find a Reflected XSS vulnerability in admin.shop.php.
The vulnerability exists due to insufficient filtration of user-supplied data in "id" HTTP parameter that will be passed to " MaNGOSWebV4-master/inc/admin/template_files/admin.shop.php ". The infected source code is line 36, there is no protection on $_GET[‘id’]; if $_GET[‘id’] contains evil js code, line 36 will trigger untrusted code to be executed on the browser side.
Hello:
I have find a Reflected XSS vulnerability in admin.shop.php.
The vulnerability exists due to insufficient filtration of user-supplied data in "id" HTTP parameter that will be passed to " MaNGOSWebV4-master/inc/admin/template_files/admin.shop.php ". The infected source code is line 36, there is no protection on $_GET[‘id’]; if $_GET[‘id’] contains evil js code, line 36 will trigger untrusted code to be executed on the browser side.
So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil.
http://your-web-root/MaNGOSWebV4-master/inc/admin/template_files/admin.shop.php?id="><script>alert(1);</script><"
The follow scrrenshot is the result to click the upper url ( win7 spq x64 + firefox 51.0.1 32bit ):
Discoverer: ADLab of Venustech
The text was updated successfully, but these errors were encountered: