Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS vulnerability #57

Open
P0wfuu opened this issue Aug 6, 2021 · 4 comments
Open

XSS vulnerability #57

P0wfuu opened this issue Aug 6, 2021 · 4 comments

Comments

@P0wfuu
Copy link

P0wfuu commented Aug 6, 2021

After the template file of ‘index.php?s=order/index' is parsed, there is a controllable variable here.
image
image
By using payload index.php?s=order&ids="><script>alert(1);</script> ,we can get an xss alert.But it need anyone is logining,so hacker can get user's cookies when they visit the evil link.
image

@gongfuxiang
Copy link
Owner

'index.php?s=order/index'的模板文件解析后,这里有一个可控变量。 通过使用payload ,我们可以获得一个xss警报。但是它需要任何人登录,所以黑客可以在访问恶意链接时获取用户的cookie。
图像
图像
index.php?s=order&ids="><script>alert(1);</script>
图像

您好、非常感谢您的反馈,这个是新版本框架升级忘记开启参数验证了,前几天已在dev分支修复。

@P0wfuu
Copy link
Author

P0wfuu commented Aug 7, 2021

Yeah,you hava fixed it.
image

@P0wfuu
Copy link
Author

P0wfuu commented Aug 7, 2021

No,No,No.This vulnerability still exists. You only use htmlspecialchars for data_request, and then url-decode $params['ids'], so we can bypass it using the second url encoding.
?s=order&ids=%2522%253E%253Cscript%253Ealert(1)%3B%253C%2Fscript%253E
image

@gongfuxiang
Copy link
Owner

No,No,No.This vulnerability still exists. You only use htmlspecialchars for data_request, and then url-decode $params['ids'], so we can bypass it using the second url encoding.
?s=order&ids=%2522%253E%253Cscript%253Ealert(1)%3B%253C%2Fscript%253E
image

您好,非常感谢您的深度测试反馈,刚才已在 dev 分支提交了新的修复方案,如有问题可以再次提交记录。

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants