JEECMS XssFilter缺陷导致的存储型XSS漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 自带的XssFilter绕过。 ### 详细说明: 在官网下载最新的jeecmsV7 ``` http://**.**.**.**/fabu/41667.jhtml ``` 其中的web.xml中配置了XssFilter如下: ``` <filter> <filter-name>XssFilter</filter-name> <filter-class>**.**.**.**mon.web.XssFilter</filter-class> <init-param> <param-name>excludeUrls</param-name> <param-value>/member/contribute@/jeeadmin/jeecms@/flow_statistic</param-value> </init-param> <init-param> <param-name>SplitChar</param-name> <param-value>@</param-value> </init-param> <init-param> <param-name>FilterChar</param-name> <param-value>'@"@\@#@:@%@></param-value> </init-param> <init-param> <param-name>ReplaceChar</param-name> <param-value>‘@“@\@#@:@%@></param-value> </init-param> </filter> ``` 在**.**.**.**mon.web.XssFilter中代码如下: ``` public class XssFilter implements Filter { private String filterChar; private String replaceChar; private String splitChar; private String excludeUrls; FilterConfig filterConfig = null; public void init(FilterConfig filterConfig) throws ServletException {...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息