Online Shop IN PHP has Cross-Site Scripting (XSS) vulnerability via $name and $details paremeter in /view.php
.
https://code-projects.org/online-shop-in-php-css-javascript-and-mysql-free-download/
/view.php - $name
and $details
paremeters.
In the /view.php
file, an unrestricted Cross-Site Scripting (XSS) vulnerability and injection attacks exist, specifically targeting the $name
and $details
paremeters. The function echo the user-supplied parameter without validation. Malicious attackers can leverage this vulnerability to access sensitive client information.
Path: /view.php?name=<img/src/onerror=alert(%27XSS%27)>
<div class="row">
<div class="box">
<h1><?php echo $_GET['name'] ?></h1>
<h4>
Product Details
</h4>
<p><?php echo $_GET['details'] ?></p>
</div>
</div>