### 简要描述: xss ### 详细说明: [WooYun: xpshop商城管理系统储存型XSS,可盲打后台](http://www.wooyun.org/bugs/wooyun-2014-083740) 继续来~ 首先来到demo演示地址注册个账号:http://etp.xpshop.cn/ [<img src="https://images.seebug.org/upload/201503/15212228ede8870d00d09309267ae86ce0ead10b.png" alt="11.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212228ede8870d00d09309267ae86ce0ead10b.png) 然后随便选个东西加入购物车 [<img src="https://images.seebug.org/upload/201503/15212258f79f683106c325017b6687534fa5a3bb.png" alt="22.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212258f79f683106c325017b6687534fa5a3bb.png) 这里有个订单附言,我们插入XSS语句:`"/><svg onload=alert(/1/)>` [<img src="https://images.seebug.org/upload/201503/152123126a2f3ec409db04ba80d6bf060d170578.png" alt="33.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/152123126a2f3ec409db04ba80d6bf060d170578.png) 然后提交,提示提交成功 [<img...
### 简要描述: xss ### 详细说明: [WooYun: xpshop商城管理系统储存型XSS,可盲打后台](http://www.wooyun.org/bugs/wooyun-2014-083740) 继续来~ 首先来到demo演示地址注册个账号:http://etp.xpshop.cn/ [<img src="https://images.seebug.org/upload/201503/15212228ede8870d00d09309267ae86ce0ead10b.png" alt="11.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212228ede8870d00d09309267ae86ce0ead10b.png) 然后随便选个东西加入购物车 [<img src="https://images.seebug.org/upload/201503/15212258f79f683106c325017b6687534fa5a3bb.png" alt="22.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212258f79f683106c325017b6687534fa5a3bb.png) 这里有个订单附言,我们插入XSS语句:`"/><svg onload=alert(/1/)>` [<img src="https://images.seebug.org/upload/201503/152123126a2f3ec409db04ba80d6bf060d170578.png" alt="33.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/152123126a2f3ec409db04ba80d6bf060d170578.png) 然后提交,提示提交成功 [<img src="https://images.seebug.org/upload/201503/15212322b839e57b04e9a7a0f6e08fed70614ac2.png" alt="44.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212322b839e57b04e9a7a0f6e08fed70614ac2.png) 接下来点击查看订单后,成功弹窗 [<img src="https://images.seebug.org/upload/201503/15212340546e8f2f021b777c8714374c36d40e62.png" alt="55.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212340546e8f2f021b777c8714374c36d40e62.png) 为证明非sefl-xss,我们来到demo后台查看一下,一般ie和QQ浏览器的话是会自动拦截跨站的,这里ie演示:http://etp.xpshop.cn/admin,用户名:admin 密码:888888 进入后台后点击查看订单后成功弹窗~ [<img src="https://images.seebug.org/upload/201503/152123560cea2025e51a7bcae186a6d1b7fe5223.png" alt="66.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/152123560cea2025e51a7bcae186a6d1b7fe5223.png) [<img src="https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png" alt="77.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png" alt="77.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201503/15212414e27a400ce65bbff6b699f2c9f94db7c3.png)