You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The incoming data is decoded by replacing (recovering the original base64 encoded url conflict characters), and then the parameter u is directly spliced and output to the page, so we can use this to construct the xss payload.
Alist Version / Alist 版本
v2.0.10-v2.1.0
Describe the bug / 问题描述
Vulnerability Introduction
A route in Alist that uses user-inputted parameters when displaying xml files and does not filter them can cause xss.
Vulnerability affects version: v2.0.10-v2.1.0
Vulnerability Analysis
A new route was added in Alist v2.0.10:
/i/:data/ipa.plist
, which allows users to control the data parameter in path.Simplified code:
The incoming data is decoded by replacing (recovering the original base64 encoded url conflict characters), and then the parameter
u
is directly spliced and output to the page, so we can use this to construct the xss payload.The paylod is base64 encoded as follows:
Replace
=
with-
, then splice in the path:Vulnerability Exploitation
After a successful local exploit, try using the official demo site to test:
Reproduction / 复现链接
https://alist.xhofe.top/i/PGE6c2NyaXB0IHhtbG5zOmE9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGh0bWwiPmFsZXJ0KDEpPC9hOnNjcmlwdD4-/ipa.plist
日志 / Logs
No response
The text was updated successfully, but these errors were encountered: