In Simple Food Website 1.0, a moderation can put the Cross Site Scripting Payload in any of the fields on http://127.0.0.1:1234/food/admin/all_users.php like Full Username, etc .This causes stored xss.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.sourcecodester.com/php/12510/simple-food-website-php.html | third party advisory exploit |
https://github.com/offsecin/bugsdisclose/blob/main/xss | third party advisory exploit |