### 简要描述:
为了测试,购买域名和邮箱花了二十块。
### 详细说明:
在母鸡的指导下把邮箱解析好了,就用自己的邮箱给coremail发了封邮件测试下。
[<img src="https://images.seebug.org/upload/201506/291805182f23002fcfcadcfd828f3be40756f211.png" alt="QQ截图20150629180445.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/291805182f23002fcfcadcfd828f3be40756f211.png)
接着发现firefox下来信邮箱的昵称(img src=1)被嵌入入了网页中
使用firefox插件Tamper Data抓包改我qq邮箱的昵称,不要continue
[<img src="https://images.seebug.org/upload/201506/291811430a2ef3d1735b85e3fd51a52531494aec.png" alt="QQ截图20150629181248.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/291811430a2ef3d1735b85e3fd51a52531494aec.png)
接着改sendname参数,写入`<svg onload=alert(document.cookie)>`
[<img src="https://images.seebug.org/upload/201506/2918144456c998916c8081796de042f2a9b2dd9a.png" alt="QQ截图20150629181512.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/2918144456c998916c8081796de042f2a9b2dd9a.png)
然后就触发了
### 漏洞证明:
win7下
[<img src="https://images.seebug.org/upload/201506/291815453233ab37d2b090291199dfee3e242372.png" alt="QQ截图20150629161218.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/291815453233ab37d2b090291199dfee3e242372.png)
osx下
[<img src="https://images.seebug.org/upload/201506/2918161341e69ed475cebd562eaaf59b0b3a8371.png" alt="QQ截图20150629161529.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/2918161341e69ed475cebd562eaaf59b0b3a8371.png)
win10下
[<img src="https://images.seebug.org/upload/201506/29181633ef230b4cffccd76103e53f7cf3756d7a.png" alt="QQ截图20150629161113.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/29181633ef230b4cffccd76103e53f7cf3756d7a.png)
暂无评论