You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Exploit Title:Jeewx-Boot-v1.3-Storage XSS
Exploit date:01.06.2021
Exploit Author:Al1ex@Heptagram
Vendor Homepage:https://github.com/zhangdaiscott/jeewx-boot
Affect Version:Jeewx-Boot-v1.3
Description:The background voting function module of jeewx-boot-v1.3 allows users to import data through templates, but does not filter the data strictly. An attacker can construct an excel with massive data and insert a malicious payload, and then cheat the administrator to import the Excel to trigger malicious XSS code.
How to Exploit
Step 1:download templates
Step 2:Insert malicious payload into template
Step 3:Then cheat the administrator to import the template application
The malicious payload was successfully executed
Suggestion
Encode the output content entity
The text was updated successfully, but these errors were encountered:
Information
How to Exploit
Step 1:download templates
Step 2:Insert malicious payload into template
Step 3:Then cheat the administrator to import the template application
The malicious payload was successfully executed
Suggestion
Encode the output content entity
The text was updated successfully, but these errors were encountered: