You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There is a Cross-Site Scripting (XSS) vulnerability in the localhost.lugvitc.net/admin/users page. The application is not properly sanitizing user input, which allows attackers to inject arbitrary JavaScript into the page and execute it within the context of other users' browsers.
Expected Behavior
The input fields should properly sanitize all user input, especially special characters such as <, >, " and '. The application should escape any potentially malicious content to prevent script execution.
Steps To Reproduce
Navigate to the localhost.lugvitc.net/admin/users page.
In the input field (e.g., name or other parameters), input the following XSS payload:
<img src="x" onerror="console.log('XSS for every user: ', document.cookie)">
Submit the form and observe that the alert XSS by amreal.in is triggered, indicating that the payload is executed.
This shows that the application is vulnerable to XSS and does not sanitize the input.
Is this a support request?
Is there an existing issue for this?
Current Behavior
There is a Cross-Site Scripting (XSS) vulnerability in the localhost.lugvitc.net/admin/users page. The application is not properly sanitizing user input, which allows attackers to inject arbitrary JavaScript into the page and execute it within the context of other users' browsers.
Expected Behavior
The input fields should properly sanitize all user input, especially special characters such as <, >, " and '. The application should escape any potentially malicious content to prevent script execution.
Steps To Reproduce
<input onfocus="alert(document.domain)" autofocus>
<img src="x" onerror="console.log('XSS for every user: ', document.cookie)">
Submit the form and observe that the alert XSS by amreal.in is triggered, indicating that the payload is executed.
This shows that the application is vulnerable to XSS and does not sanitize the input.
Environment
Runtime environment
Anything else?
No response
The text was updated successfully, but these errors were encountered: