Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

phpmywind5.5 Persistent(stored) XSS #3

Open
panghusec opened this issue Aug 15, 2018 · 0 comments
Open

phpmywind5.5 Persistent(stored) XSS #3

panghusec opened this issue Aug 15, 2018 · 0 comments

Comments

@panghusec
Copy link
Owner

panghusec commented Aug 15, 2018

Attackers can get admin's Cookie and do otherthing

1.First download the phpmywind the Latest version from http://phpmywind.com/downloads/PHPMyWind_5.5.zip

2.install it

3. register an ordinary user and find an article to comment

phpmywind1

4.find an article to comment such as http://localhost/newsshow.php?cid=4&id=18

2

5.use burpsuite and modify Referer,such as "Referer: javascript:alert(/panghu from EversecLab/);"

3

6.Login as Admin and request http://localhost/admin/usercomment.php to review user's comments and click the comment whitch include xss payload

1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant