Title of the Vulnerability: Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko
Product Name: image_gallery
Product Type: Image Gallery Management System
Finder & Exploit Owner: Maloy Roy Orko
Vulnerability Class: Reflected Cross Site Scripting
Vendor:
needyamin
Vendor Link:
https://github.com/needyamin/
Vulnerable Product Link: https://github.com/needyamin/image_gallery/
Affected Components:
view.php?username=
Suggested Description:
Reflected XSS in "view.php?username=" in "image_gallery application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "to execute malicious JavaScript code via XSS as no validations are provided and can get cookies of admin" via "view.php?username=".
Attack Vectors:
To exploit vulnerability,he has to input XSS exploits via view.php?username= and then he can give the links to their targets even Admin and when targets click it! Attacker can gain admin cookie and then he can login admin and as the file upload isn't protected can hijack the whole server too!He can even execute malicious JavaScript codes into visitors browser via this vulnerability.
Detailed Blog:
https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html