### 简要描述:
rt
### 详细说明:
收货地址处
[<img src="https://images.seebug.org/upload/201406/05022029551cf284ca8b054bcf6df20a9a3f0dc9.jpg" alt="c1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201406/05022029551cf284ca8b054bcf6df20a9a3f0dc9.jpg)
提交订单 。后台 查看时 触发
[<img src="https://images.seebug.org/upload/201406/050220587e244dcee8ea6fe1dad90effbaabb225.jpg" alt="c2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201406/050220587e244dcee8ea6fe1dad90effbaabb225.jpg)
可打cookie
[<img src="https://images.seebug.org/upload/201406/050221297125af9d8563a8e9919fd623d18cfdb9.jpg" alt="c3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201406/050221297125af9d8563a8e9919fd623d18cfdb9.jpg)
后台getshell姿势很多。就不多说了。
关键字 :
Power by CuuMall
还是有一定 用户量的
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201406/050220587e244dcee8ea6fe1dad90effbaabb225.jpg" alt="c2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201406/050220587e244dcee8ea6fe1dad90effbaabb225.jpg)
暂无评论