### 简要描述:
xss盲打
### 详细说明:
地址:http://mall.kingdee.com/cart.action
1.三处小的xss (鸡肋)
[<img src="https://images.seebug.org/upload/201501/3118190033eacb43407a6a5e1cf489075763c43c.jpg" alt="<img/src=1 onerror=alert(/test/)>.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/3118190033eacb43407a6a5e1cf489075763c43c.jpg)
[<img src="https://images.seebug.org/upload/201501/311819205f3ca2cf240f9e36a0d2dd637ec7eeb1.jpg" alt="工作信息xss.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/311819205f3ca2cf240f9e36a0d2dd637ec7eeb1.jpg)
[<img src="https://images.seebug.org/upload/201501/31181935ce8d33d0db9c4f21bb7eb7a74c2b3d4b.jpg" alt="教育信息xss.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/31181935ce8d33d0db9c4f21bb7eb7a74c2b3d4b.jpg)
2.一处反射型的xss, 位于商城主页的搜索处(鸡肋)
```
http://mall.kingdee.com/search.action?k=%3Cscript%3Ealert%282%29%3B%3C%2Fscript%3E
```
[<img src="https://images.seebug.org/upload/201501/31182216f625d13f1e8375e3c12308d3c4c4ed4c.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/31182216f625d13f1e8375e3c12308d3c4c4ed4c.jpg)
3.后台盲打组织成员(较严重)
注册了两个帐号进行测试,用B账户申请加入A账户的组织中,盲打A账户!
[<img src="https://images.seebug.org/upload/201501/311824273882fe5f0cf368b491f7689e9bb72865.jpg" alt="02.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/311824273882fe5f0cf368b491f7689e9bb72865.jpg)
申请加入A账户创建的组织中,当然也不非得是A账户的组织,也可以是任意的组织!所以才会出现盲打任意组织账户!
A账户当后台查看B账户的申请记录的时候,B账户的用户名处的xss跨站被触发。
[<img src="https://images.seebug.org/upload/201501/3118264532de6267290c91032d251a752dd13cca.jpg" alt="盲打组织效果.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/3118264532de6267290c91032d251a752dd13cca.jpg)
### 漏洞证明:
地址:http://mall.kingdee.com/cart.action
1.三处小的xss (鸡肋)
[<img src="https://images.seebug.org/upload/201501/3118190033eacb43407a6a5e1cf489075763c43c.jpg" alt="<img/src=1 onerror=alert(/test/)>.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/3118190033eacb43407a6a5e1cf489075763c43c.jpg)
[<img src="https://images.seebug.org/upload/201501/311819205f3ca2cf240f9e36a0d2dd637ec7eeb1.jpg" alt="工作信息xss.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/311819205f3ca2cf240f9e36a0d2dd637ec7eeb1.jpg)
[<img src="https://images.seebug.org/upload/201501/31181935ce8d33d0db9c4f21bb7eb7a74c2b3d4b.jpg" alt="教育信息xss.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/31181935ce8d33d0db9c4f21bb7eb7a74c2b3d4b.jpg)
2.一处反射型的xss, 位于商城主页的搜索处(鸡肋)
```
http://mall.kingdee.com/search.action?k=%3Cscript%3Ealert%282%29%3B%3C%2Fscript%3E
```
[<img src="https://images.seebug.org/upload/201501/31182216f625d13f1e8375e3c12308d3c4c4ed4c.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/31182216f625d13f1e8375e3c12308d3c4c4ed4c.jpg)
3.后台盲打组织成员(较严重)
注册了两个帐号进行测试,用B账户申请加入A账户的组织中,盲打A账户!
[<img src="https://images.seebug.org/upload/201501/311824273882fe5f0cf368b491f7689e9bb72865.jpg" alt="02.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/311824273882fe5f0cf368b491f7689e9bb72865.jpg)
申请加入A账户创建的组织中,当然也不非得是A账户的组织,也可以是任意的组织!所以才会出现盲打任意组织账户!
A账户当后台查看B账户的申请记录的时候,B账户的用户名处的xss跨站被触发。
[<img src="https://images.seebug.org/upload/201501/3118264532de6267290c91032d251a752dd13cca.jpg" alt="盲打组织效果.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/3118264532de6267290c91032d251a752dd13cca.jpg)
暂无评论