Skip to content

Jeewx-Boot-v1.3-Storage XSS #33

@Al1ex

Description

@Al1ex

Information

Exploit Title:Jeewx-Boot-v1.3-Storage XSS
Exploit date:01.06.2021
Exploit Author:Al1ex@Heptagram
Vendor Homepage:https://github.com/zhangdaiscott/jeewx-boot
Affect Version:Jeewx-Boot-v1.3
Description:The background voting function module of jeewx-boot-v1.3 allows users to import data through templates, but does not filter the data strictly. An attacker can construct an excel with massive data and insert a malicious payload, and then cheat the administrator to import the Excel to trigger malicious XSS code.

How to Exploit

Step 1:download templates
Step 2:Insert malicious payload into template
image
Step 3:Then cheat the administrator to import the template application
image
The malicious payload was successfully executed
image

Suggestion

Encode the output content entity

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions