### 简要描述:
rt
### 详细说明:
https://github.com/githubpaul/rackmonkey/blob/eb94bbdace564ba00ed5895996530fdf062380f4/conf/httpd-rackmonkey.conf
```
<fieldset class="fieldset fieldset-mask">
<legend>mask 区域</legend>
<pre><mask>*****support@king*****
*****ord "kin*****
</mask></pre>
</fieldset>
```
只要itsupport@kingdee.gbl前的用户名就可以登陆邮箱mail.kingdee.com了
[<img src="https://images.seebug.org/upload/201506/04202328b7d668915ca6cbc08810b43a179ee80c.jpg" alt="QQ图片20150604202315.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/04202328b7d668915ca6cbc08810b43a179ee80c.jpg)
[<img src="https://images.seebug.org/upload/201506/042024090204c0a802264a55ab15bbe6a3636820.jpg" alt="QQ图片20150604202358.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/042024090204c0a802264a55ab15bbe6a3636820.jpg)
[<img src="https://images.seebug.org/upload/201506/042024381c273454e15b2b3268ff82d9f0d710a6.png" alt="QQ图片20150604202427.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/042024381c273454e15b2b3268ff82d9f0d710a6.png)
对话信息等
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201506/042024381c273454e15b2b3268ff82d9f0d710a6.png" alt="QQ图片20150604202427.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/042024381c273454e15b2b3268ff82d9f0d710a6.png)
暂无评论