Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A stored XSS vulnerability in the feedback function module of jfinal_cms V5.1.0 #32

Open
SomUrim opened this issue Mar 10, 2022 · 1 comment

Comments

@SomUrim
Copy link

SomUrim commented Mar 10, 2022

There is a stored XSS vulnerability in the feedback function module of jfinal_cms V5.1.0

There is a stored XSS vulnerability in the feedback of jfinal_cms. An attacker can insert malicious XSS code into the feedback content. When the administrator views the feedback list in the background, the malicious XSS code is successfully triggered.

First register for a user test, then enter the feedback page, insert malicious XSS attack code in the feedback content:

Payload : 111"><script>alert(document.cookie)</script>

Then, when the administrator views the feedback in the background, the malicious XSS code is successfully triggered, and there is no need to click on the corresponding feedback, it can be triggered only on the list page.

XSS1
Administrators view the feedback list:
xssview

Successfully executed malicious XSS code:
XSS2

Safety advice:

  • Strictly filter the user's input
  • Strict control of page rendering content
@ElevenKong
Copy link

ElevenKong commented Mar 10, 2022 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants