CVE-2020-25761

Projectworlds Visitor Management System in PHP 1.0 allows XSS. The file myform.php does not perform input validation on the request parameters. An attacker can inject javascript payloads in the parameters to perform various attacks such as stealing of cookies,sensitive information etc.
References
Link Resource
http://seclists.org/fulldisclosure/2020/Sep/45 Exploit Mailing List Third Party Advisory
http://packetstormsecurity.com/files/159263/Visitor-Management-System-In-PHP-1.0-Cross-Site-Scripting.html Exploit Third Party Advisory VDB Entry
https://packetstormsecurity.com/files/author/15149/ Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:projectworlds:visitor_management_system_in_php:1.0:*:*:*:*:*:*:*

Information

Published : 2020-09-30 11:15

Updated : 2020-10-05 16:31


NVD link : CVE-2020-25761

Mitre link : CVE-2020-25761


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Advertisement

dedicated server usa

Products Affected

projectworlds

  • visitor_management_system_in_php