Skip to content

Sanitize asdf parameter in picture.php to prevent reflected XSS#104

Open
zeropath-ai-staging[bot] wants to merge 1 commit intohugbubby-patch-28from
zvuln_fix_52fa4d6c
Open

Sanitize asdf parameter in picture.php to prevent reflected XSS#104
zeropath-ai-staging[bot] wants to merge 1 commit intohugbubby-patch-28from
zvuln_fix_52fa4d6c

Conversation

@zeropath-ai-staging
Copy link

This reflected cross-site scripting (XSS) vulnerability in picture.php allows an attacker to execute arbitrary JavaScript code in a user's browser. The vulnerability exists because the application echoes the value of the asdf parameter from the GET request directly into the HTML output on line 14 without proper sanitization, which causes the browser to execute any malicious script injected via the URL.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants