### 简要描述:
EasyTalk存储型xss,可盗取cookie可csrf
### 详细说明:
先注册一个会员 然后文件上传 (需要管理员开启文件上传插件)
来到广场,点文件上传,然后用burp抓包
[<img src="https://images.seebug.org/upload/201402/1021092655e97728812638089ac5eb44ee5f10bb.jpg" alt="xss.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/1021092655e97728812638089ac5eb44ee5f10bb.jpg)
[<img src="https://images.seebug.org/upload/201402/10211132b58dc0ae2452d962665c0e3a6f287de1.jpg" alt="burp.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/10211132b58dc0ae2452d962665c0e3a6f287de1.jpg)
[<img src="https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg" alt="eee.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg)
最后说下不知道什么时候打到官网的cookie,官网后台以沦陷
[<img src="https://images.seebug.org/upload/201402/10211621bb4844d96c52565aa94cb22be3e88bd0.jpg" alt="cookie.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/10211621bb4844d96c52565aa94cb22be3e88bd0.jpg)
修改cookie后直接登录后台截图
[<img src="https://images.seebug.org/upload/201402/1021175385ff59373b1a508613697411b9af9b67.jpg" alt="ok.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/1021175385ff59373b1a508613697411b9af9b67.jpg)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg" alt="eee.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg)
暂无评论