Reflective XSS vulnerability in Stock Management System
In processlogin PHP, in lines 18-25 of the code, the parameters entered by the front end are brought into the database for associated table query, and then the results of database execution are returned. After the 27th line of code, judge the results of database execution, and return the output results to the front end, which is shown in the interface. Payload is 1 '<script>alert (1)</script>, that is, after the statement is closed, return it to the front end, and output it on the front end, causing XSS vulnerabilities.
Reflective XSS vulnerability in Stock Management System
Proof of vulnerability utilization:
POC:
The text was updated successfully, but these errors were encountered: