Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The information at the bottom of the homepage exists in stored xss #291

Closed
ss122-0ss opened this issue Mar 26, 2024 · 1 comment
Closed

Comments

@ss122-0ss
Copy link

ss122-0ss commented Mar 26, 2024

System settings exist storage type xss

1、Write payload in the information at the bottom of the homepage

图片

2、The vulnerability can be triggered when viewing article content on the home page

图片

Burpsuite packet capture analysis, payload is located in the footer_info parameter

burpsuite抓包分析,payload位于footer_info参数中

图片

Code: Line 154 in admin/setting, when the parameter is save, footer_info is accepted

代码:位于admin/setting中的154行,当参数为save时,接受footer_info
图片

The filtering function is function postStrVar(), located in line 19 of input.php. It strictly filters the input characters, leading to stored xss attacks.

过滤函数为function postStrVar(),位于input.php中19行,为对输入的字符进行严格过滤,导致存储xss攻击

图片

@emlog
Copy link
Owner

emlog commented Apr 7, 2024

Thanks for your feedback, but this isn't an issue in our opinion.

@emlog emlog closed this as completed Apr 7, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants