Skip to content

Instantly share code, notes, and snippets.

@T-pod
Last active Nov 29, 2019
Embed
What would you like to do?

zrlog version 2.1.3 path /post/addComment "username" parameter XSS

Cross-site scripting (XSS) vulnerability in the comment section in ZrLog 2.1.3 allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.

Send a post request with the parameter username = "><img src=1 onerror=alert(document.cookie)> image image

The issues address: 94fzb/zrlog#56

Fixed:https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment