Skip to content
Open
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions install.php
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@
//----------------------------------------------------------- include
define('PHPWG_ROOT_PATH','./');

echo $_GET['asdf'];

Comment thread
hugbubby marked this conversation as resolved.
Outdated
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reflected XSS Vulnerability in install.php via 'asdf' Parameter (Severity: HIGH)

This reflected cross-site scripting (XSS) vulnerability allows attackers to execute arbitrary JavaScript in a user's browser, potentially leading to account compromise or data theft. The install.php script directly echoes unsanitized input from the asdf GET parameter, as seen on lines 12-13, which causes any provided JavaScript code to be rendered in the response. An attacker can craft a malicious URL containing JavaScript, and when a user visits this link, the script will execute within their browser.
View details in ZeroPath

Suggested change
echo $_GET['asdf'];
if (isset($_GET['asdf'])) {
echo htmlspecialchars($_GET['asdf'], ENT_QUOTES, 'UTF-8');
}

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reflected XSS Vulnerability in install.php via GET Parameter (Severity: HIGH)

This reflected cross-site scripting (XSS) vulnerability could allow an attacker to execute arbitrary JavaScript in a user's browser, potentially leading to session hijacking or defacement. The install.php script directly outputs the value of the asdf GET parameter on lines 12-13 using echo $_GET['asdf'] without any sanitization. This allows an attacker to inject malicious scripts into the page by crafting a URL with a JavaScript payload in the asdf parameter.
View details in ZeroPath

Suggested change
echo $_GET['asdf'];
if (isset($_GET['asdf']) && $_GET['asdf'] !== '') {
echo htmlspecialchars($_GET['asdf'], ENT_QUOTES, 'UTF-8');
}

// @set_magic_quotes_runtime(0); // Disable magic_quotes_runtime
//
// addslashes to vars if magic_quotes_gpc is off this is a security
Expand Down