### 简要描述:
xss
### 详细说明:
发布商品处存在两处储存型xss漏洞无任何过滤
首先是在内容处选择源代码模式
[<img src="https://images.seebug.org/upload/201407/03170501314c63416fad3c43a5ee923629ee253d.jpg" alt="QQ图片20140703165955.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170501314c63416fad3c43a5ee923629ee253d.jpg)
之后我们提交之后再标题处插入xss语句
[<img src="https://images.seebug.org/upload/201407/03170545bdd57b56cdcb5cb226abf9956df07d5b.jpg" alt="QQ图片20140703170121.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170545bdd57b56cdcb5cb226abf9956df07d5b.jpg)
之后发布,看看情况
[<img src="https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg" alt="QQ图片20140703170137.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg)
[<img src="https://images.seebug.org/upload/201407/031706337ef0f36b5d9faf400c7f9f767f62abcd.jpg" alt="QQ图片20140703170146.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031706337ef0f36b5d9faf400c7f9f767f62abcd.jpg)
我们再去看看发布后的源码
标题处
[<img src="https://images.seebug.org/upload/201407/03170704930adaf51520cabb07296b4d7348d521.jpg" alt="QQ图片20140703170226.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170704930adaf51520cabb07296b4d7348d521.jpg)
内容处
[<img src="https://images.seebug.org/upload/201407/031707436e62ceff6a62f722a8cd7c12b338349a.jpg" alt="QQ图片20140703170250.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031707436e62ceff6a62f722a8cd7c12b338349a.jpg)
两个地方都没有任何过滤啊!!!
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg" alt="QQ图片20140703170137.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg)
暂无评论