From d23c98043310d5eb433b793f138ddc7321dae7f7 Mon Sep 17 00:00:00 2001 From: Mufeed VH Date: Fri, 29 Mar 2019 00:14:11 +0530 Subject: [PATCH] Fixed Multiple HTML Injection Vulnerabilities **Fixed multiple HTML Injection vulnerabilities in "$customer[x]" output which prints out inside "value" tag without filtering causing it to break the entire HTML page structure.** :+1: **What is HTML Injection:** https://www.acunetix.com/vulnerabilities/web/html-injection/ **Proof of Concept:** http://freecs9.epizy.com/core-php-admin/edit_customer.php?customer_id=256&operation=edit ***You can see that the injected HTML caused the page to break it's structure*** ***Any payload appended with escaping characters (">) can break the page*** **Fix it ASAP as it's critical and this is an admin panel used by several people** :) --- forms/customer_form.php | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/forms/customer_form.php b/forms/customer_form.php index 351e1b5..46ce74d 100644 --- a/forms/customer_form.php +++ b/forms/customer_form.php @@ -1,12 +1,12 @@
- +
- +
@@ -45,21 +45,21 @@
- +
- +
- +
-
\ No newline at end of file +