### 简要描述: ThinkPHP官网XSS漏洞,我就不信你不给审核通过! ### 详细说明: 漏洞地址http://www.thinkphp.cn/topic/35973.html 详情自己看图! [<img src="https://images.seebug.org/upload/201601/041142464a593c036cf0b0b21003dda7b5942054.png" alt="火狐截图_2016-01-04T03-42-20.830Z.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041142464a593c036cf0b0b21003dda7b5942054.png) [<img src="https://images.seebug.org/upload/201601/041144164a177f4bb58a088da49275cfabfe8127.png" alt="QQ截图20160104114347.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041144164a177f4bb58a088da49275cfabfe8127.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201601/0411451529918cd7955edd297529ddf8969d8c75.png" alt="QQ截图20160104114451.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0411451529918cd7955edd297529ddf8969d8c75.png) [<img...
### 简要描述: ThinkPHP官网XSS漏洞,我就不信你不给审核通过! ### 详细说明: 漏洞地址http://www.thinkphp.cn/topic/35973.html 详情自己看图! [<img src="https://images.seebug.org/upload/201601/041142464a593c036cf0b0b21003dda7b5942054.png" alt="火狐截图_2016-01-04T03-42-20.830Z.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041142464a593c036cf0b0b21003dda7b5942054.png) [<img src="https://images.seebug.org/upload/201601/041144164a177f4bb58a088da49275cfabfe8127.png" alt="QQ截图20160104114347.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041144164a177f4bb58a088da49275cfabfe8127.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201601/0411451529918cd7955edd297529ddf8969d8c75.png" alt="QQ截图20160104114451.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0411451529918cd7955edd297529ddf8969d8c75.png) [<img src="https://images.seebug.org/upload/201601/041146253deb53ee0eb0012fc359f5f041ce5ea9.png" alt="QQ截图20160104114606.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041146253deb53ee0eb0012fc359f5f041ce5ea9.png)