### 简要描述:
rt
### 详细说明:
自带的360防护脚本对于xss过滤太弱,
留言处没有 对html代码进行实体转义,造成xss。
如,提交
```
<img src="/>"onerror="eval('\141\154\145\162\164\50\61\51')">
```
[<img src="https://images.seebug.org/upload/201407/17232020f560ede5584487501221e5c781074210.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/17232020f560ede5584487501221e5c781074210.jpg)
后台查看留言即可触发
[<img src="https://images.seebug.org/upload/201407/172325233c27e181a00d34a126cd4ea8590384db.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/172325233c27e181a00d34a126cd4ea8590384db.jpg)
加载远程js可偷cookie
[<img src="https://images.seebug.org/upload/201407/17232548c64e1ec0dd2c98da5ef2a350cb34b4a4.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/17232548c64e1ec0dd2c98da5ef2a350cb34b4a4.jpg)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201407/172325233c27e181a00d34a126cd4ea8590384db.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/172325233c27e181a00d34a126cd4ea8590384db.jpg)
暂无评论