### 简要描述: EasyTalk以系统身份向用户发XSS ### 详细说明: 出现问题的代码文件路径 : easytalk/Home/Lib/Action/ImAction.class.php 代码加载时 ``` public function _initialize() { parent::init(); } ``` 没要求登录 而EasyTalk存储型XSS和以系统身份向任意用户发私信的漏洞在这代码 ``` //发表聊天 public function sendmsg() { $ret=D('Messages')->sendmsg(daddslashes($_POST['content']) ,daddslashes($_POST['nickname']),$this->my); if ($ret=='success') { echo json_encode(array("ret"=>'success',"tip"=>L('send_msg_success'),'data'=>array('nickname'=>$this->my['nickname'],'sendtime'=>timeop(time()),'conetnt'=>A('Content')->ubb($_POST['content'])))); } else { echo json_encode(array("ret"=>'error',"tip"=>$ret)); } } ``` $_POST['content'] 为消息内容,可以注入XSS $_POST['nickname'] 则是目标用户的用户名 ### 漏洞证明: [<img src="https://images.seebug.org/upload/201404/03054054c44d4f0142ff31b6aae3690ef32c848b.png" alt="1.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/03054054c44d4f0142ff31b6aae3690ef32c848b.png) [<img...
### 简要描述: EasyTalk以系统身份向用户发XSS ### 详细说明: 出现问题的代码文件路径 : easytalk/Home/Lib/Action/ImAction.class.php 代码加载时 ``` public function _initialize() { parent::init(); } ``` 没要求登录 而EasyTalk存储型XSS和以系统身份向任意用户发私信的漏洞在这代码 ``` //发表聊天 public function sendmsg() { $ret=D('Messages')->sendmsg(daddslashes($_POST['content']) ,daddslashes($_POST['nickname']),$this->my); if ($ret=='success') { echo json_encode(array("ret"=>'success',"tip"=>L('send_msg_success'),'data'=>array('nickname'=>$this->my['nickname'],'sendtime'=>timeop(time()),'conetnt'=>A('Content')->ubb($_POST['content'])))); } else { echo json_encode(array("ret"=>'error',"tip"=>$ret)); } } ``` $_POST['content'] 为消息内容,可以注入XSS $_POST['nickname'] 则是目标用户的用户名 ### 漏洞证明: [<img src="https://images.seebug.org/upload/201404/03054054c44d4f0142ff31b6aae3690ef32c848b.png" alt="1.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/03054054c44d4f0142ff31b6aae3690ef32c848b.png) [<img src="https://images.seebug.org/upload/201404/0305413867eb54a693f490fa6b95205a64440d36.png" alt="2.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/0305413867eb54a693f490fa6b95205a64440d36.png) 可以看到是以系统身份发布的