Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Jeewx-Boot-v1.3-Storage XSS #33

Open
Al1ex opened this issue Jun 1, 2021 · 0 comments
Open

Jeewx-Boot-v1.3-Storage XSS #33

Al1ex opened this issue Jun 1, 2021 · 0 comments

Comments

@Al1ex
Copy link

Al1ex commented Jun 1, 2021

Information

Exploit Title:Jeewx-Boot-v1.3-Storage XSS
Exploit date:01.06.2021
Exploit Author:Al1ex@Heptagram
Vendor Homepage:https://github.com/zhangdaiscott/jeewx-boot
Affect Version:Jeewx-Boot-v1.3
Description:The background voting function module of jeewx-boot-v1.3 allows users to import data through templates, but does not filter the data strictly. An attacker can construct an excel with massive data and insert a malicious payload, and then cheat the administrator to import the Excel to trigger malicious XSS code.

How to Exploit

Step 1:download templates
Step 2:Insert malicious payload into template
image
Step 3:Then cheat the administrator to import the template application
image
The malicious payload was successfully executed
image

Suggestion

Encode the output content entity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant