### 简要描述:
看到http://www.wooyun.org/bugs/wooyun-2010-051965过了,我也来了
存储型xss
### 详细说明:
利用官方demo测试
http://demo.31390.com:8080/eLearning/user.html
随意点击一个用户
在留言处写入xss语句
[<img src="https://images.seebug.org/upload/201407/14152649e5851bcc1a968c17acc0c41d5748c4ac.jpg" alt="QQ图片20140714152620.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/14152649e5851bcc1a968c17acc0c41d5748c4ac.jpg)
点击留言试试
直接就给弹了。。
[<img src="https://images.seebug.org/upload/201407/141528037950926ef2c334ee17a161ddf241267c.jpg" alt="QQ图片20140714152743.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528037950926ef2c334ee17a161ddf241267c.jpg)
看看源代码
毫无过滤
[<img src="https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg" alt="QQ图片20140714152834.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg)
测试地址:http://demo.31390.com:8080/eLearning/message/s800.html
其实本身是html文件,给予xss很大空间
测试一下通用性
http://ssd3.31390.com/eLearning/user.html
[<img src="https://images.seebug.org/upload/201407/1415310186355a33a9f59f05a58efd76584ccb10.jpg" alt="QQ图片20140714153038.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/1415310186355a33a9f59f05a58efd76584ccb10.jpg)
http://jhxx.mhedu.sh.cn/eLearning/user.html
[<img src="https://images.seebug.org/upload/201407/141532114b38295cd01cd89eaae16deac549d156.jpg" alt="QQ图片20140714153148.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141532114b38295cd01cd89eaae16deac549d156.jpg)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg" alt="QQ图片20140714152834.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg)
暂无评论