Skip to content

There is a stored xss vulnerability here: /index.php?m=home&c=message&a=add #5

Open
@zhendezuile

Description

Vulnerability file:\Application\Home\Controller\MessageController.class.php
You can see that the xss vulnerability is not filtered here
image

Vulnerability to reproduce:
1、Visit url: http://www.xxx.com/index.php?m=home&c=message&a=add ,use the post method to pass in parameter values,the specific operation screenshots are as follows:
image
2、Access background address: http://www.xxx.com/Admin/Message/index/menuId/132 ,you can see the success popup
image
Or you can log in to the background, click Extension Tools, and then click Message Management,a popup will appear next
image

Repair suggestion:
Use php built-in functions such as htmlspecialchars to filter xss vulnerabilities

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions