### 简要描述: EasyTalk存储型xss,可盗取cookie可csrf ### 详细说明: 先注册一个会员 然后文件上传 (需要管理员开启文件上传插件) 来到广场,点文件上传,然后用burp抓包 [<img src="https://images.seebug.org/upload/201402/1021092655e97728812638089ac5eb44ee5f10bb.jpg" alt="xss.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/1021092655e97728812638089ac5eb44ee5f10bb.jpg) [<img src="https://images.seebug.org/upload/201402/10211132b58dc0ae2452d962665c0e3a6f287de1.jpg" alt="burp.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/10211132b58dc0ae2452d962665c0e3a6f287de1.jpg) [<img src="https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg" alt="eee.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg) 最后说下不知道什么时候打到官网的cookie,官网后台以沦陷 [<img src="https://images.seebug.org/upload/201402/10211621bb4844d96c52565aa94cb22be3e88bd0.jpg" alt="cookie.jpg"...
### 简要描述: EasyTalk存储型xss,可盗取cookie可csrf ### 详细说明: 先注册一个会员 然后文件上传 (需要管理员开启文件上传插件) 来到广场,点文件上传,然后用burp抓包 [<img src="https://images.seebug.org/upload/201402/1021092655e97728812638089ac5eb44ee5f10bb.jpg" alt="xss.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/1021092655e97728812638089ac5eb44ee5f10bb.jpg) [<img src="https://images.seebug.org/upload/201402/10211132b58dc0ae2452d962665c0e3a6f287de1.jpg" alt="burp.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/10211132b58dc0ae2452d962665c0e3a6f287de1.jpg) [<img src="https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg" alt="eee.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg) 最后说下不知道什么时候打到官网的cookie,官网后台以沦陷 [<img src="https://images.seebug.org/upload/201402/10211621bb4844d96c52565aa94cb22be3e88bd0.jpg" alt="cookie.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/10211621bb4844d96c52565aa94cb22be3e88bd0.jpg) 修改cookie后直接登录后台截图 [<img src="https://images.seebug.org/upload/201402/1021175385ff59373b1a508613697411b9af9b67.jpg" alt="ok.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/1021175385ff59373b1a508613697411b9af9b67.jpg) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg" alt="eee.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/102113563579d07173f7f8c3d89aa7f289b9a384.jpg)