unafraid-fearless
unafraid-fearless
The location of the reflected XSS vulnerability is in the first menu of the first module in the background Enter my test payload 4   Forgive me, a picture...
Interface location entry:http://{IP}:8081/wetech_web/admin/role/add.do,payload:4 ==> %3Cp%2FonMouseoVer%3Dconfirm%607%60%3E4  [payload:](payload:4) 
1.Interface address location:http://{IP_address}/wetech_web/admin/user/add.do    2.I deleted the Referer and Origin fields,Interface replay successful,Here Generate CSRF HTML using Burp,The username and password are designed to be root123  ...