### 简要描述:
demo站点测试成功
### 详细说明:
漏洞主要源码
```
case 'updateinfo':
$id = intval($_POST['id']);
checkInfoUser($id, trim($_REQUEST['password']));
$title = $_POST['title'] ? htmlspecialchars_deep(trim($_POST['title'])) : '';
$areaid = $_POST['areaid'] ? intval($_POST['areaid']) : '';
$enddate = !empty($_POST['enddate']) ? (intval($_POST['enddate']*3600*24)) + time() : '0';
$content = $_POST['content'] ? htmlspecialchars_deep(trim($_POST['content'])) : '';
$linkman = $_POST['linkman'] ? htmlspecialchars_deep(trim($_POST['linkman'])) : '';
$phone = $_POST['phone'] ? trim($_POST['phone']) : ''; //没用html函数处理
$qq = $_POST['qq'] ? intval($_POST['qq']) : '';
$email = $_POST['email'] ? htmlspecialchars_deep(trim($_POST['email'])) : '';
$address = $_POST['address'] ? trim($_POST['address']) : '';
$mappoint = $_POST['mappoint'] ? trim($_POST['mappoint']) : '';
if(empty($title))showmsg("标题不能为空");
if(empty($phone) && empty($qq) && empty($email))showmsg("电话、qq、email,必须填写一项");
check_words(array($title,$content));
$items = array(
'areaid' => $areaid,
'title' => $title,
'content' => $content,
'linkman' => $linkman,
'email' => $email,
'qq' => $qq,
'phone' => $phone,
'mappoint' => $mappoint,
'address' => $address,
'enddate' => $enddate
);
$res = editInfo($items, $_POST['cus_value'], $id);
$res ? $msg="恭喜您,修改成功!" : $msg="抱歉修改失败,请与客服联系。";
$link = "view.php?id=$id";
showmsg($msg, $link);
break;
```
### 漏洞证明:
漏洞证明
随便注册一个用户然后登陆官网demo
在个人中心处 点击 发布
[<img src="https://images.seebug.org/upload/201502/0216195109e5aebcc257f3051ad2619308cd930d.png" alt="45.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201502/0216195109e5aebcc257f3051ad2619308cd930d.png)
随便输入内容 后 然后点击我的信息
[<img src="https://images.seebug.org/upload/201502/0216201659b41e814074a044db22b860c4aac1f9.png" alt="46.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201502/0216201659b41e814074a044db22b860c4aac1f9.png)
点击编辑
在移动电话处输入
```
');alert('xss
```
然后确定
然后查看发布内容
点击查看归属地按钮 就弹框了
[<img src="https://images.seebug.org/upload/201502/02162106bc1d0461436568475511a3897965bdc4.png" alt="47.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201502/02162106bc1d0461436568475511a3897965bdc4.png)
[<img src="https://images.seebug.org/upload/201502/021621196bd943b07b3235765b080453f26dac8d.png" alt="48.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201502/021621196bd943b07b3235765b080453f26dac8d.png)
[<img src="https://images.seebug.org/upload/201502/0216221948f936ca21a6e2fbdb160662996a19f1.png" alt="49.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201502/0216221948f936ca21a6e2fbdb160662996a19f1.png)
暂无评论