### 简要描述: cmseasy某处存储型XSS,无限制 ### 详细说明: 在bbs的评论处可以用富文本进行XSS: [<img src="https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png) [<img src="https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png) ### 漏洞证明: 在bbs的评论处可以用富文本进行XSS: [<img src="https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png) [<img src="https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png" alt="2.png" width="600"...
### 简要描述: cmseasy某处存储型XSS,无限制 ### 详细说明: 在bbs的评论处可以用富文本进行XSS: [<img src="https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png) [<img src="https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png) ### 漏洞证明: 在bbs的评论处可以用富文本进行XSS: [<img src="https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/22173432eaae71e2efd3e4c890fd152dc1ec1561.png) [<img src="https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201311/2217350428e1f1b023db8035089c3b5c88be7566.png)