Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ForestBlog Existing Xss #99

Open
QDming opened this issue Mar 29, 2024 · 0 comments
Open

ForestBlog Existing Xss #99

QDming opened this issue Mar 29, 2024 · 0 comments

Comments

@QDming
Copy link

QDming commented Mar 29, 2024

Vulnerability Product:ForestBlog
Vulnerability version: all
Vulnerability type: Stored XSS
Vulnerability Details:

<script>alert(document.cookie)</script>

the Stored XSS payload could let admin causes disclosure of cookies、root path of websites、variables of PHP and stuff

  1. Login link: http://forestblog.liuyanzhao.com/login
    I registered my own account here
    Account: linkk
    Password: linkk
    image

  2. When writing the article title or content, enter<script>alert (document. cookie)</script>
    Click to publish
    image

  3. Click on the homepage to view this article
    image

Discovered that xss was triggered

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant