### 简要描述: 这个是商城管理系统,你们懂得哈~ ### 详细说明: demo演示哈~ 官网:http://xpshop.cn demo地址http://hzp.xpshop.cn demo后台:http://etp.xpshop.cn/admin 用户名:admin 密码:888888 先注册个会员账号,然后存在XSS的地址在会员中心--地址管理--收货人姓名那里我先插入<body/onload=alert(888)> [<img src="https://images.seebug.org/upload/201411/18150404a3d5261562543c8796c99a4efb608f55.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150404a3d5261562543c8796c99a4efb608f55.png) 然后保存可以看到成功弹窗 [<img src="https://images.seebug.org/upload/201411/18150445096d002efb627ae4e2110c518e95df32.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150445096d002efb627ae4e2110c518e95df32.png) 然后查看源码可以看到是储存型XSS [<img src="https://images.seebug.org/upload/201411/18150459ffa1e4f19dcec60009be65f2d29ce113.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150459ffa1e4f19dcec60009be65f2d29ce113.png) 接下来先去随便选个东西 [<img...
### 简要描述: 这个是商城管理系统,你们懂得哈~ ### 详细说明: demo演示哈~ 官网:http://xpshop.cn demo地址http://hzp.xpshop.cn demo后台:http://etp.xpshop.cn/admin 用户名:admin 密码:888888 先注册个会员账号,然后存在XSS的地址在会员中心--地址管理--收货人姓名那里我先插入<body/onload=alert(888)> [<img src="https://images.seebug.org/upload/201411/18150404a3d5261562543c8796c99a4efb608f55.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150404a3d5261562543c8796c99a4efb608f55.png) 然后保存可以看到成功弹窗 [<img src="https://images.seebug.org/upload/201411/18150445096d002efb627ae4e2110c518e95df32.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150445096d002efb627ae4e2110c518e95df32.png) 然后查看源码可以看到是储存型XSS [<img src="https://images.seebug.org/upload/201411/18150459ffa1e4f19dcec60009be65f2d29ce113.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150459ffa1e4f19dcec60009be65f2d29ce113.png) 接下来先去随便选个东西 [<img src="https://images.seebug.org/upload/201411/1815053608c9623a4ab0a53e0c5f5d3419f1a8a7.png" alt="4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/1815053608c9623a4ab0a53e0c5f5d3419f1a8a7.png) 然后购买,地址那里是我们之前插入的XSS语句 [<img src="https://images.seebug.org/upload/201411/18150727379b713a10f85531010979a771c42f7b.png" alt="5.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150727379b713a10f85531010979a771c42f7b.png) 提交订单 [<img src="https://images.seebug.org/upload/201411/1815075964e2dc6d6ad338f025abc5162e7bfd4b.png" alt="6.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/1815075964e2dc6d6ad338f025abc5162e7bfd4b.png) 查看订单可以看到成功触发XSS [<img src="https://images.seebug.org/upload/201411/1815081825ec8b9c274fb7d6e88163a38bb02dc4.png" alt="7.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/1815081825ec8b9c274fb7d6e88163a38bb02dc4.png) 接下来来到后台查看订单,可以看到成功触发XSS语句 [<img src="https://images.seebug.org/upload/201411/18150850f0695314d8c094edc716d47f7b5d7be8.png" alt="8.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150850f0695314d8c094edc716d47f7b5d7be8.png) [<img src="https://images.seebug.org/upload/201411/181508556e592bccec9c54e596e1e35baa17261e.png" alt="9.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/181508556e592bccec9c54e596e1e35baa17261e.png) [<img src="https://images.seebug.org/upload/201411/181508595c43c68c613eb495bae1082df5cc5d86.png" alt="10.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/181508595c43c68c613eb495bae1082df5cc5d86.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201411/18150850f0695314d8c094edc716d47f7b5d7be8.png" alt="8.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/18150850f0695314d8c094edc716d47f7b5d7be8.png) [<img src="https://images.seebug.org/upload/201411/181508556e592bccec9c54e596e1e35baa17261e.png" alt="9.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/181508556e592bccec9c54e596e1e35baa17261e.png) [<img src="https://images.seebug.org/upload/201411/181508595c43c68c613eb495bae1082df5cc5d86.png" alt="10.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201411/181508595c43c68c613eb495bae1082df5cc5d86.png)