Skip to content

Instantly share code, notes, and snippets.

@T-pod
Last active November 29, 2019 05:12
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save T-pod/d9405dbd61243990d65d55c5df0fcbe6 to your computer and use it in GitHub Desktop.
Save T-pod/d9405dbd61243990d65d55c5df0fcbe6 to your computer and use it in GitHub Desktop.

zrlog version 2.1.3 path /post/addComment "username" parameter XSS

Cross-site scripting (XSS) vulnerability in the comment section in ZrLog 2.1.3 allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.

Send a post request with the parameter username = "><img src=1 onerror=alert(document.cookie)> image image

The issues address: 94fzb/zrlog#56

Fixed:https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment