We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
您好: 我是360代码安全的工作人员,在我们的开源代码检测项目中发现perfect-ssm中存在两处反射型xss漏洞,详细信息如下: 在pictureManage.jsp文件的27、28行处接受了get请求中的type、grade参数,并直接在33、75行等地方进行html拼凑,导致恶意攻击者可以通过构造特定的链接
复现: 构造如下链接: http://perfect-ssm.13blog.site/views/pictureManage.jsp?type=1&grade=%22%3E%3C/table%3E%3C/body%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E// 当管理员访问时会执行脚本 这里以弹框为例,实际攻击场景中会将cookie发送到受控制的服务器上
The text was updated successfully, but these errors were encountered:
No branches or pull requests
您好:
![default](https://user-images.githubusercontent.com/39950310/52767988-0da20f00-3067-11e9-9c6d-9d47ee630233.png)
我是360代码安全的工作人员,在我们的开源代码检测项目中发现perfect-ssm中存在两处反射型xss漏洞,详细信息如下:
在pictureManage.jsp文件的27、28行处接受了get请求中的type、grade参数,并直接在33、75行等地方进行html拼凑,导致恶意攻击者可以通过构造特定的链接
复现:
![default](https://user-images.githubusercontent.com/39950310/52768401-5efece00-3068-11e9-8451-ca8db5e818d7.png)
构造如下链接:
http://perfect-ssm.13blog.site/views/pictureManage.jsp?type=1&grade=%22%3E%3C/table%3E%3C/body%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E//
当管理员访问时会执行脚本
这里以弹框为例,实际攻击场景中会将cookie发送到受控制的服务器上
The text was updated successfully, but these errors were encountered: