wetech-cms
wetech-cms copied to clipboard
wetech cms是本人整合开发的一套内容管理系统。旨在开发一个通用的、可持续开发集成的、方便扩展的cms系统,目前主要用来替代本人的wordpress博客
项目无法启动
在wetech-core 目录下执行 mvn jetty:run 无法正常启动 ``` xxx:wetech-core master$ mvn jetty:run [INFO] Scanning for projects... [INFO] [INFO] ----------------------< tech.wetech:wetech-core >----------------------- [INFO] Building wetech-core 0.0.1-SNAPSHOT [INFO] --------------------------------[ jar ]--------------------------------- [INFO] [INFO] >>>...
效果如下,请问是什么原因呢   
Interface location entry:http://{IP}:8081/wetech_web/admin/role/add.do,payload:4 ==> %3Cp%2FonMouseoVer%3Dconfirm%607%60%3E4  [payload:](payload:4) 
1.Interface address location:http://{IP_address}/wetech_web/admin/user/add.do    2.I deleted the Referer and Origin fields,Interface replay successful,Here Generate CSRF HTML using Burp,The username and password are designed to be root123  ...