Skip to content

Fix reflected XSS in nbm.php by escaping asdf GET parameter#103

Open
zeropath-ai-staging[bot] wants to merge 1 commit intohugbubby-patch-27from
zvuln_fix_2dc978ff
Open

Fix reflected XSS in nbm.php by escaping asdf GET parameter#103
zeropath-ai-staging[bot] wants to merge 1 commit intohugbubby-patch-27from
zvuln_fix_2dc978ff

Conversation

@zeropath-ai-staging
Copy link

This reflected cross-site scripting (XSS) vulnerability in nbm.php allows an attacker to inject arbitrary JavaScript into the application, potentially leading to session hijacking or defacement. The vulnerability exists because the application directly reflects the asdf parameter from the GET request in the response on line 24 without proper sanitization or escaping, which causes the browser to execute any injected scripts.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants