Cross-site Scripting (XSS) - Reflected in zoujingli/thinkadmin
Valid
Reported on
Aug 25th 2021
✍️ Description
The Application is Vulnerable to reflected XSS Attack.
🕵️♂️ Proof of Concept
Open the following page in the browser as admin. The 商品名称 field is vulnerable to reflected XSS. An alert box is displayed as PoC.
https://testdomain11.com/data/shop.goods/index.html?cateids=941&code=94102&marks=%E8%A1%A3%E6%9C%8D&name=mLfNTqZD%27%22()%26%25%3Cacx%3E%3Cscript%3Ealert(1)%3C/ScRiPt%3E&rebate_type=0&status=0&truck_type=0&vip_entry=0
💥 Impact
Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then impersonate that user.
Furthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user. Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker.
References
We have contacted a member of the
zoujingli/thinkadmin
team and are waiting to hear back
2 years ago
to join this conversation