vendor:
Comment System 1.0
by:
Pintu Solanki
8.8
CVSS
HIGH
Stored Cross-Site Scripting
79
CWE
Product Name: Comment System 1.0
Affected Version From: Comment System 1.0
Affected Version To: Comment System 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:comment_system_1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4
2021
Comment System 1.0 – ‘multiple’ Stored Cross-Site Scripting
Comment System 1.0 is vulnerable to Stored Cross-Site Scripting (XSS) attacks. An attacker can inject malicious JavaScript code into the 'Your Name' and 'Comment' fields of the comment form. When a user visits the page, the malicious code will be executed in the user's browser.
Mitigation:
Input validation should be used to prevent malicious code from being stored in the database. Additionally, output encoding should be used to prevent malicious code from being executed in the user's browser.