Tag
#php
Tourism Management System version 1.0 suffers from a cross site scripting vulnerability.
TitanNit Web Control 2.01 and Atemio 7600 suffer from a PHP code injection vulnerability.
Teacher Subject Allocation Management System version 1.0 suffers from an ignored default credential vulnerability.
Task Management System version 1.0 suffers from a PHP code injection vulnerability.
Supply Chain Management version 1.0 suffers from a backup disclosure vulnerability.
Event Management System version 1.0 suffers from an insecure direct object reference vulnerability.
Student Attendance Management System version 1.0 suffers from an ignored default credential vulnerability.
Printing Business Records Management System version 1.0 suffers from a cross site request forgery vulnerability.
Online Eyewear Shop version 1.0 suffers from a cross site request forgery vulnerability.
### Summary A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Transports" feature allows authenticated users to inject arbitrary JavaScript through the "Details" section (which contains multiple fields depending on which transport is selected at that moment). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. ### Details The vulnerability occurs when creating an alert transport. The application does not properly sanitize the user input in the "Details" field, allowing an attacker to inject and store arbitrary JavaScript. This script is then executed in the context of the page whenever the alert transport is viewed or processed. For instance, the following payload can be used to trigger the XSS: ```test1<script>{onerror=alert}throw 1337</script>``` When the page containing the transport details is loaded, this payload causes the browser to exec...