Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

反射型xss漏洞 #8

Open
QiAnXinCodeSafe opened this issue Feb 14, 2019 · 0 comments
Open

反射型xss漏洞 #8

QiAnXinCodeSafe opened this issue Feb 14, 2019 · 0 comments

Comments

@QiAnXinCodeSafe
Copy link

您好:
我是360代码安全的工作人员,在我们的开源代码检测项目中发现perfect-ssm中存在两处反射型xss漏洞,详细信息如下:
default
在pictureManage.jsp文件的27、28行处接受了get请求中的type、grade参数,并直接在33、75行等地方进行html拼凑,导致恶意攻击者可以通过构造特定的链接

复现:
构造如下链接:
http://perfect-ssm.13blog.site/views/pictureManage.jsp?type=1&grade=%22%3E%3C/table%3E%3C/body%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E//
当管理员访问时会执行脚本
default
这里以弹框为例,实际攻击场景中会将cookie发送到受控制的服务器上

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant