You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When we input the file content as payload, we find that the front end does not allow input /, so we can capture the package and modify the content or paste the payload directly into the file content.
Right-click the file and select "show url", open the file URL to trigger xss.
When the administrator opens the file after uploading the file, it can also trigger xss.
The text was updated successfully, but these errors were encountered:
SunJ3t
changed the title
Landing-CMS has Cross Site Scripting.
Landing-CMS has Storage Cross Site Scripting.
Nov 23, 2020
First access the file management page, then click new file to upload the file, select the html file format.
http://192.168.187.2/assets/vendor/responsive_filemanager_9.12.1/filemanager/dialog.php
payload:
<script>alert(document.cookie)</scrtipt>
When we input the file content as payload, we find that the front end does not allow input /, so we can capture the package and modify the content or paste the payload directly into the file content.
Right-click the file and select "show url", open the file URL to trigger xss.
When the administrator opens the file after uploading the file, it can also trigger xss.
The text was updated successfully, but these errors were encountered: