### 简要描述:
xss
### 详细说明:
[WooYun: xpshop商城管理系统储存型XSS,可盲打后台](http://www.wooyun.org/bugs/wooyun-2014-083740)
继续来~
首先来到demo演示地址注册个账号:http://etp.xpshop.cn/
[<img src="https://images.seebug.org/upload/201503/15212228ede8870d00d09309267ae86ce0ead10b.png" alt="11.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212228ede8870d00d09309267ae86ce0ead10b.png)
然后随便选个东西加入购物车
[<img src="https://images.seebug.org/upload/201503/15212258f79f683106c325017b6687534fa5a3bb.png" alt="22.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212258f79f683106c325017b6687534fa5a3bb.png)
这里有个订单附言,我们插入XSS语句:`"/><svg onload=alert(/1/)>`
[<img src="https://images.seebug.org/upload/201503/152123126a2f3ec409db04ba80d6bf060d170578.png" alt="33.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/152123126a2f3ec409db04ba80d6bf060d170578.png)
然后提交,提示提交成功
[<img src="https://images.seebug.org/upload/201503/15212322b839e57b04e9a7a0f6e08fed70614ac2.png" alt="44.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212322b839e57b04e9a7a0f6e08fed70614ac2.png)
接下来点击查看订单后,成功弹窗
[<img src="https://images.seebug.org/upload/201503/15212340546e8f2f021b777c8714374c36d40e62.png" alt="55.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212340546e8f2f021b777c8714374c36d40e62.png)
为证明非sefl-xss,我们来到demo后台查看一下,一般ie和QQ浏览器的话是会自动拦截跨站的,这里ie演示:http://etp.xpshop.cn/admin,用户名:admin 密码:888888
进入后台后点击查看订单后成功弹窗~
[<img src="https://images.seebug.org/upload/201503/152123560cea2025e51a7bcae186a6d1b7fe5223.png" alt="66.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/152123560cea2025e51a7bcae186a6d1b7fe5223.png)
[<img src="https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png" alt="77.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png" alt="77.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png)
暂无评论