Multiple stored cross-site scripting (XSS) vulnerabilities in Train Scheduler App v1.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Train Code, Train Name, and Destination text fields.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://train.com | not applicable |
http://oretnom23.com | url repurposed not applicable |
https://github.com/draco1725/POC/blob/main/Exploit/Train%20Scheduler%20App/XSS | third party advisory exploit |