### 简要描述:
cmseasy某处存储型XSS,无限制
### 详细说明:
在bbs的评论处可以用富文本进行XSS:
[<img src="https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png)
[<img src="https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png)
### 漏洞证明:
在bbs的评论处可以用富文本进行XSS:
[<img src="https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png)
[<img src="https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png)
暂无评论