### 简要描述:
还是没有过滤
### 详细说明:
该漏洞主要是在Coremail手机浏览器上面触发,亲测无浏览器限制,漏洞点在邮件标题:测试代码为:nik"><img src=x onerror=alert(1)>,发信后,收件人打开信件时不会触发,但是在点击右下角的"转发"按钮后就会触发xss漏洞。如图:
[<img src="https://images.seebug.org/upload/201507/17164406886420e2e0a7d9f05334c79caa2f196a.png" alt="S1111111QQ图片20150717164115.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/17164406886420e2e0a7d9f05334c79caa2f196a.png)
漏洞触发:
[<img src="https://images.seebug.org/upload/201507/1716450208e90d2e541f668cdb90aec7652d0ed2.jpg" alt="手机1QQ图片20150716094417.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/1716450208e90d2e541f668cdb90aec7652d0ed2.jpg)
漏洞触发:
[<img src="https://images.seebug.org/upload/201507/1716452371cb5564e78d8f15faf085218c12c006.png" alt="手机2QQ图片20150716094531.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/1716452371cb5564e78d8f15faf085218c12c006.png)
### 漏洞证明:
该漏洞主要是在Coremail手机浏览器上面触发,亲测无浏览器限制,漏洞点在邮件标题:测试代码为:`nik"><img src=x onerror=alert(1)>`,发信后,收件人打开信件时不会触发,但是在点击右下角的"转发"按钮后就会触发xss漏洞。如图:
[<img src="https://images.seebug.org/upload/201507/17164406886420e2e0a7d9f05334c79caa2f196a.png" alt="S1111111QQ图片20150717164115.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/17164406886420e2e0a7d9f05334c79caa2f196a.png)
漏洞触发:
[<img src="https://images.seebug.org/upload/201507/1716450208e90d2e541f668cdb90aec7652d0ed2.jpg" alt="手机1QQ图片20150716094417.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/1716450208e90d2e541f668cdb90aec7652d0ed2.jpg)
漏洞触发:
[<img src="https://images.seebug.org/upload/201507/1716452371cb5564e78d8f15faf085218c12c006.png" alt="手机2QQ图片20150716094531.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/1716452371cb5564e78d8f15faf085218c12c006.png)
暂无评论