### 简要描述:
EasyTalk以系统身份向用户发XSS
### 详细说明:
出现问题的代码文件路径 : easytalk/Home/Lib/Action/ImAction.class.php
代码加载时
```
public function _initialize() {
parent::init();
}
```
没要求登录
而EasyTalk存储型XSS和以系统身份向任意用户发私信的漏洞在这代码
```
//发表聊天
public function sendmsg() {
$ret=D('Messages')->sendmsg(daddslashes($_POST['content']) ,daddslashes($_POST['nickname']),$this->my);
if ($ret=='success') {
echo json_encode(array("ret"=>'success',"tip"=>L('send_msg_success'),'data'=>array('nickname'=>$this->my['nickname'],'sendtime'=>timeop(time()),'conetnt'=>A('Content')->ubb($_POST['content']))));
} else {
echo json_encode(array("ret"=>'error',"tip"=>$ret));
}
}
```
$_POST['content'] 为消息内容,可以注入XSS
$_POST['nickname'] 则是目标用户的用户名
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201404/03054054c44d4f0142ff31b6aae3690ef32c848b.png" alt="1.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/03054054c44d4f0142ff31b6aae3690ef32c848b.png)
[<img src="https://images.seebug.org/upload/201404/0305413867eb54a693f490fa6b95205a64440d36.png" alt="2.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/0305413867eb54a693f490fa6b95205a64440d36.png)
可以看到是以系统身份发布的
暂无评论