### 简要描述: 齐博CMS存储型xss一枚 打任意用户cookie 指哪打哪 ### 详细说明: 在编辑出这块的 内容处源码模式插入 ``` <img src=# onerror=alert(/Keyboard/)> ``` 这个标签可以 没过滤 [<img src="https://images.seebug.org/upload/201504/252109094bbd32fbfe88b49481693e60a77d3ac7.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252109094bbd32fbfe88b49481693e60a77d3ac7.png) 访问新闻页面就 [<img src="https://images.seebug.org/upload/201504/25211451375e55ad9d1c2bbdd026256f3a772e20.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/25211451375e55ad9d1c2bbdd026256f3a772e20.jpg) [<img src="https://images.seebug.org/upload/201504/252114571c23ec2fcd52cf559bd22c9735b07bd3.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252114571c23ec2fcd52cf559bd22c9735b07bd3.png) ok 触发任意用户访问都可以 [<img src="https://images.seebug.org/upload/201504/2521100361c158c8432021f195642d266bcd3861.jpg" alt="2.jpg"...
### 简要描述: 齐博CMS存储型xss一枚 打任意用户cookie 指哪打哪 ### 详细说明: 在编辑出这块的 内容处源码模式插入 ``` <img src=# onerror=alert(/Keyboard/)> ``` 这个标签可以 没过滤 [<img src="https://images.seebug.org/upload/201504/252109094bbd32fbfe88b49481693e60a77d3ac7.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252109094bbd32fbfe88b49481693e60a77d3ac7.png) 访问新闻页面就 [<img src="https://images.seebug.org/upload/201504/25211451375e55ad9d1c2bbdd026256f3a772e20.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/25211451375e55ad9d1c2bbdd026256f3a772e20.jpg) [<img src="https://images.seebug.org/upload/201504/252114571c23ec2fcd52cf559bd22c9735b07bd3.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252114571c23ec2fcd52cf559bd22c9735b07bd3.png) ok 触发任意用户访问都可以 [<img src="https://images.seebug.org/upload/201504/2521100361c158c8432021f195642d266bcd3861.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/2521100361c158c8432021f195642d266bcd3861.jpg) 调用xss平台 插入js语句 就可以了 [<img src="https://images.seebug.org/upload/201504/252110280eea8e4f0b9862b1fc9fc8b65aa3b535.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252110280eea8e4f0b9862b1fc9fc8b65aa3b535.jpg) cookie就打到了 任意用户访问都可以 编辑器漏洞啊 是发送消息插入也ok [<img src="https://images.seebug.org/upload/201504/25211809b877b659ca4d0384cdd948223b80d71d.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/25211809b877b659ca4d0384cdd948223b80d71d.jpg) [<img src="https://images.seebug.org/upload/201504/252118151ef9e42ae4806b84e7b5269d05266726.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252118151ef9e42ae4806b84e7b5269d05266726.png) ok指哪打哪 ### 漏洞证明: 在编辑出这块的 内容处源码模式插入 ``` <img src=# onerror=alert(/Keyboard/)> ``` 这个标签可以 没过滤 [<img src="https://images.seebug.org/upload/201504/252109094bbd32fbfe88b49481693e60a77d3ac7.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252109094bbd32fbfe88b49481693e60a77d3ac7.png) 访问新闻页面就 [<img src="https://images.seebug.org/upload/201504/25211451375e55ad9d1c2bbdd026256f3a772e20.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/25211451375e55ad9d1c2bbdd026256f3a772e20.jpg) [<img src="https://images.seebug.org/upload/201504/252114571c23ec2fcd52cf559bd22c9735b07bd3.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252114571c23ec2fcd52cf559bd22c9735b07bd3.png) ok 触发任意用户访问都可以 [<img src="https://images.seebug.org/upload/201504/2521100361c158c8432021f195642d266bcd3861.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/2521100361c158c8432021f195642d266bcd3861.jpg) 调用xss平台 插入js语句 就可以了 [<img src="https://images.seebug.org/upload/201504/252110280eea8e4f0b9862b1fc9fc8b65aa3b535.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252110280eea8e4f0b9862b1fc9fc8b65aa3b535.jpg) cookie就打到了 任意用户访问都可以 编辑器漏洞啊 是发送消息插入也ok [<img src="https://images.seebug.org/upload/201504/25211809b877b659ca4d0384cdd948223b80d71d.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/25211809b877b659ca4d0384cdd948223b80d71d.jpg) [<img src="https://images.seebug.org/upload/201504/252118151ef9e42ae4806b84e7b5269d05266726.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201504/252118151ef9e42ae4806b84e7b5269d05266726.png) ok指哪打哪