### 简要描述: 看到http://www.wooyun.org/bugs/wooyun-2010-051965过了,我也来了 存储型xss ### 详细说明: 利用官方demo测试 http://demo.31390.com:8080/eLearning/user.html 随意点击一个用户 在留言处写入xss语句 [<img src="https://images.seebug.org/upload/201407/14152649e5851bcc1a968c17acc0c41d5748c4ac.jpg" alt="QQ图片20140714152620.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/14152649e5851bcc1a968c17acc0c41d5748c4ac.jpg) 点击留言试试 直接就给弹了。。 [<img src="https://images.seebug.org/upload/201407/141528037950926ef2c334ee17a161ddf241267c.jpg" alt="QQ图片20140714152743.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528037950926ef2c334ee17a161ddf241267c.jpg) 看看源代码 毫无过滤 [<img src="https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg" alt="QQ图片20140714152834.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg)...
### 简要描述: 看到http://www.wooyun.org/bugs/wooyun-2010-051965过了,我也来了 存储型xss ### 详细说明: 利用官方demo测试 http://demo.31390.com:8080/eLearning/user.html 随意点击一个用户 在留言处写入xss语句 [<img src="https://images.seebug.org/upload/201407/14152649e5851bcc1a968c17acc0c41d5748c4ac.jpg" alt="QQ图片20140714152620.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/14152649e5851bcc1a968c17acc0c41d5748c4ac.jpg) 点击留言试试 直接就给弹了。。 [<img src="https://images.seebug.org/upload/201407/141528037950926ef2c334ee17a161ddf241267c.jpg" alt="QQ图片20140714152743.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528037950926ef2c334ee17a161ddf241267c.jpg) 看看源代码 毫无过滤 [<img src="https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg" alt="QQ图片20140714152834.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg) 测试地址:http://demo.31390.com:8080/eLearning/message/s800.html 其实本身是html文件,给予xss很大空间 测试一下通用性 http://ssd3.31390.com/eLearning/user.html [<img src="https://images.seebug.org/upload/201407/1415310186355a33a9f59f05a58efd76584ccb10.jpg" alt="QQ图片20140714153038.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/1415310186355a33a9f59f05a58efd76584ccb10.jpg) http://jhxx.mhedu.sh.cn/eLearning/user.html [<img src="https://images.seebug.org/upload/201407/141532114b38295cd01cd89eaae16deac549d156.jpg" alt="QQ图片20140714153148.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141532114b38295cd01cd89eaae16deac549d156.jpg) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg" alt="QQ图片20140714152834.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/141528504ce60cc3cdf98252b5b0db8234c8bacb.jpg)