You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 27, 2023. It is now read-only.
Summary
The parameter
project
is not sanitized, so attackers can poison this parameter and then create a reflected XSS attack.PoC
http://domain.tld/display.php?browse[]=all&project=1">test</a><script>alert(123)</script>&select=desk&_=1555500329996
Details
The flaw exists since
$project
was assigned to a GET parameter without sanitizingi-librarian/display.php
Line 15 in 07a2668
then,
$project
was printed without escapingi-librarian/display.php
Line 326 in 07a2668
The text was updated successfully, but these errors were encountered: