### 简要描述: xss ### 详细说明: 发布商品处存在两处储存型xss漏洞无任何过滤 首先是在内容处选择源代码模式 [<img src="https://images.seebug.org/upload/201407/03170501314c63416fad3c43a5ee923629ee253d.jpg" alt="QQ图片20140703165955.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170501314c63416fad3c43a5ee923629ee253d.jpg) 之后我们提交之后再标题处插入xss语句 [<img src="https://images.seebug.org/upload/201407/03170545bdd57b56cdcb5cb226abf9956df07d5b.jpg" alt="QQ图片20140703170121.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170545bdd57b56cdcb5cb226abf9956df07d5b.jpg) 之后发布,看看情况 [<img src="https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg" alt="QQ图片20140703170137.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg) [<img src="https://images.seebug.org/upload/201407/031706337ef0f36b5d9faf400c7f9f767f62abcd.jpg"...
### 简要描述: xss ### 详细说明: 发布商品处存在两处储存型xss漏洞无任何过滤 首先是在内容处选择源代码模式 [<img src="https://images.seebug.org/upload/201407/03170501314c63416fad3c43a5ee923629ee253d.jpg" alt="QQ图片20140703165955.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170501314c63416fad3c43a5ee923629ee253d.jpg) 之后我们提交之后再标题处插入xss语句 [<img src="https://images.seebug.org/upload/201407/03170545bdd57b56cdcb5cb226abf9956df07d5b.jpg" alt="QQ图片20140703170121.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170545bdd57b56cdcb5cb226abf9956df07d5b.jpg) 之后发布,看看情况 [<img src="https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg" alt="QQ图片20140703170137.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg) [<img src="https://images.seebug.org/upload/201407/031706337ef0f36b5d9faf400c7f9f767f62abcd.jpg" alt="QQ图片20140703170146.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031706337ef0f36b5d9faf400c7f9f767f62abcd.jpg) 我们再去看看发布后的源码 标题处 [<img src="https://images.seebug.org/upload/201407/03170704930adaf51520cabb07296b4d7348d521.jpg" alt="QQ图片20140703170226.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/03170704930adaf51520cabb07296b4d7348d521.jpg) 内容处 [<img src="https://images.seebug.org/upload/201407/031707436e62ceff6a62f722a8cd7c12b338349a.jpg" alt="QQ图片20140703170250.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031707436e62ceff6a62f722a8cd7c12b338349a.jpg) 两个地方都没有任何过滤啊!!! ### 漏洞证明: [<img src="https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg" alt="QQ图片20140703170137.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/031706114e06aa6a50d9afc9b88bf06846c481d3.jpg)