CVE-2017-12846
the problem is in /finecms/dayrui/controllers/member/api.php
Third-party platforms are invoked here, but the filtering is not strictly enforced.The vulnerability function is as follows
1 |
|
Here we can see$value
and$city
Parameters do not open XSS filter,although$value
are limited by a length of 10,The result is that even a short domain name cannot construct an effective XSS,But our $city
parameters do not filter effectively,And it is directly assign to the template.
Let’s look at the templatebaidumap.html
1 |
|
You can see that our $city variable is injected directly into the < strong > label, so we can construct the payload directly
1 |
|
(not just baidumap, the upload and other functions on the back of the page have this situation, the same solution)