Skip to content

Commit

Permalink
[ADD] DedeCMS_v5.7_carbuyaction_存储型XSS
Browse files Browse the repository at this point in the history
  • Loading branch information
Evi1CLAY committed Jul 23, 2017
1 parent a596f87 commit f1722c6
Show file tree
Hide file tree
Showing 10 changed files with 54 additions and 10 deletions.
32 changes: 32 additions & 0 deletions DedeCMS/DedeCMS_v5.7_carbuyaction_存储型XSS/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
# DedeCMS_v5.7_shops_delivery_存储型XSS

## Affected Version

DedeCMS-V5.7-UTF8-SP2 � 发布日期 2017-03-15 �

下载地址� 链接: https://pan.baidu.com/s/1bprjPx1 密码: mwdq


## PoC

该漏洞比较鸡肋,需要登� 管理员后台通过 添加配送方� 功能 才能触发� 添加后在前后台都会触� 存储� XSS�

之所以会触发是因为在系统� 管理员输入的 配送方�-描述字段(des)在入库前只进行� addslashes 转义特殊字符处理,其实这没毛病�

重要的是取出数据库的数据输出到页面前没进� HTML 实体编码处理直接输出导致最终的 XSS�

测试�

1. 后台添加 配送方�

![](add_delivery.png)

2. 添加成功后直接展示配送方式列表,触发 XSS

![](show_delivery.png)

此外,这� XSS 在前台用户购买东西选择配送方式的时候也会触发�

## References

1. https://www.seebug.org/vuldb/ssvid-92863
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
http://www.heiyaoshi8.com/member/shops_products.php ����©��
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
28 changes: 19 additions & 9 deletions DedeCMS/DedeCMS_v5.7_shops_delivery_存储型XSS/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,29 +4,39 @@

DedeCMS-V5.7-UTF8-SP2 ( 发布日期 2017-03-15 )

需要站点启用商城功能。

下载地址: 链接: https://pan.baidu.com/s/1bprjPx1 密码: mwdq


## PoC

该漏洞比较鸡肋,需要登录 管理员后台通过 添加配送方式 功能 才能触发, 添加后在前后台都会触发 存储型 XSS。

之所以会触发是因为在系统对 管理员输入的 配送方式-描述字段(des)在入库前只进行了 addslashes 转义特殊字符处理,其实这没毛病。
该漏洞 通过用户在编写订单收货地址的相关参数 注入 XSS Payload,导致 前台查看订单的页面和后台管理员查看订单详情的页面都会被 XSS。

重要的是取出数据库的数据输出到页面前没进行 HTML 实体编码处理直接输出导致最终的 XSS
所以说,可以用来打管理员 Cookie

测试:

1. 后台添加 配送方式
1. 首先管理员添加一项商城的商品

![](add_delivery.png)
![](add_good.png)

2. 添加成功后直接展示配送方式列表,触发 XSS
2. 前台用户选定商品添加购物车

![](show_delivery.png)

此外,这个 XSS 在前台用户购买东西选择配送方式的时候也会触发。
3. 前台用户编辑订单的收货地址,在这里 `address,des,email,postname` 都是存在 XSS 的,插入 XSS Payload ,

![](edit_address.png)

4. 查看订单详情发现前台已经被 XSS

![](xssed)

5. 管理员进入后台查看商城订单同样也会被 XSS :P

![](back_xssed.png)

## References

1. https://www.seebug.org/vuldb/ssvid-92863
1. https://www.seebug.org/vuldb/ssvid-92855
3 changes: 2 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

Content Management System Vulnerability Hunter

>借用 M 牛的一句话,喜欢请点 Star,如果不打算贡献,千万别 Fork
> 说明:目前来看,本项目会进行长期维护,有修改的建议或者想法欢迎联系作者。
***

Expand All @@ -13,6 +13,7 @@ Content Management System Vulnerability Hunter
#### DedeCMS

- [DedeCMS_v5.7_shops_delivery_存储型XSS](DedeCMS/DedeCMS_v5.7_shops_delivery_存储型XSS)
- [DedeCMS_v5.7_carbuyaction_存储型XSS](DedeCMS_v5.7_carbuyaction_存储型XSS)

#### Struts

Expand Down

0 comments on commit f1722c6

Please sign in to comment.