Skip to content

Instantly share code, notes, and snippets.

@T-pod
T-pod / zrlog-xss.md
Last active November 29, 2019 05:12

zrlog version 2.1.3 path /post/addComment "username" parameter XSS

Cross-site scripting (XSS) vulnerability in the comment section in ZrLog 2.1.3 allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.

Send a post request with the parameter username = "><img src=1 onerror=alert(document.cookie)> image image

The issues address: 94fzb/zrlog#56

Fixed:https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941