关联漏洞
介绍
# CVE-2024-50969
## Description
A Reflected cross-site scripting (XSS) vulnerability in browse.php of Code-projects Jonnys Liquor 1.0 allows remote attackers to inject arbitrary web scripts or HTML via the search parameter.
## Vulnerability Type
Cross Site Scripting (XSS)
## Vendor of Product
Code-projects
## Affected Product Code Base:
https://code-projects.org/jonnys-liquor-in-php-css-javascript-and-mysql-free-download/ - 1.0
## Affected Component:
browse.php
## Attack Vectors:
1. Set up the application locally
2. Navigate to the following URL in your web browser:
http://localhost/jonnysLiquor-master/
3. In the search input field of the application, enter the following payload:
"><script>alert(1)</script>
4. After submitting the input, the script executes in the browser, confirming the reflected XSS vulnerability.
## Reference:
1. https://code-projects.org/jonnys-liquor-in-php-css-javascript-and-mysql-free-download/
2. https://owasp.org/www-community/attacks/xss/
3. https://portswigger.net/web-security/cross-site-scripting/reflected
文件快照
[4.0K] /data/pocs/3fe1e75c275907f54df2bbb7d8ad20fa3be71711
└── [1.0K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。