SourceCodester Online Tours & Travels Management System traveller_details.php cross site scripting
url: admin/traveller_details.php
Abstract:
Line 111 of traveller_details.php sends unvalidated data to a web browser, which can result in the browser executing malicious code.
Explanation:
Cross-site scripting (XSS) vulnerabilities occur when:
-
Data enters a web application through an untrusted source. In the case of persistent (also known as stored) XSS, the untrusted source is typically a database or other back-end data store, while in the case of reflected XSS it is typically a web request.
-
The data is included in dynamic content that is sent to a web user without being validated.
In this case, the data is sent at builtin_echo() in traveller_details.php at line 111.
It is clear that the application doesn’t perform data validation and trust user-supplied data, we can use the below XSS payload as input which may be stored in the application.
payload :
<img src=0 onerror=alert(2)>