Skip to content

Instantly share code, notes, and snippets.

Last active Nov 29, 2019
What would you like to do?

zrlog version 2.1.3 path /post/addComment "username" parameter XSS

Cross-site scripting (XSS) vulnerability in the comment section in ZrLog 2.1.3 allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.

Send a post request with the parameter username = "><img src=1 onerror=alert(document.cookie)> image image

The issues address: 94fzb/zrlog#56


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment