Projectworlds Visitor Management System in PHP 1.0 allows XSS. The file myform.php does not perform input validation on the request parameters. An attacker can inject javascript payloads in the parameters to perform various attacks such as stealing of cookies,sensitive information etc.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2020/Sep/45 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/159263/Visitor-Management-System-In-PHP-1.0-Cross-Site-Scripting.html | exploit vdb entry third party advisory |
https://packetstormsecurity.com/files/author/15149/ | exploit vdb entry third party advisory |