jflyfox / jfinal_cms

jfinal cms是一个java开发的功能强大的信息咨询网站,采用了简洁强大的JFinal作为web框架,模板引擎用的是beetl,数据库用mysql,前端bootstrap框架。支持oauth2认证、帐号注册、密码加密、评论及回复,消息提示,网站访问量统计,文章评论数和浏览量统计,回复管理,支持权限管理。后台模块包含:栏目管理,栏目公告,栏目滚动图片,文章管理,回复管理,意见反馈,我的相册,相册管理,图片管理,专辑管理、视频管理、缓存更新,友情链接,访问统计,联系人管理,模板管理,组织机构管理,用户管理,角色管理,菜单管理,数据字典管理。
http://mtg.jflyfox.com/
Apache License 2.0
627 stars 285 forks source link

There is a stored xss vulnerability exists in jfinal_cms #30

Open afeng2016-s opened 2 years ago

afeng2016-s commented 2 years ago

[Suggested description] jfinal_ There is a storage XSS vulnerability in the background system of CMS. Because developers do not filter the parameters submitted by the user input form, any user with background permission can affect the system security by entering malicious code. via a Google search in url:http://localhost/jfinal_cms/admin/site/save/5

[Vulnerability Type] Cross Site Scripting (XSS)

[Vendor of Product] https://github.com/jflyfox/jfinal_cms

[Affected Product Code Base] Less than 5.1 0

[Affected Component] POST /jfinal_cms/admin/site/save/5 HTTP/1.1 Host: localhost Content-Length: 1777 Cache-Control: max-age=0 sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="92" sec-ch-ua-mobile: ?0 Upgrade-Insecure-Requests: 1 Origin: http://localhost Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryBl1vjLCSUZbB3vef User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: iframe Referer: http://localhost/jfinal_cms/admin/site/edit/5 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 ...... ------WebKitFormBoundaryBl1vjLCSUZbB3vef Content-Disposition: form-data; name="model.name" 博客 //your xss payload ------WebKitFormBoundaryBl1vjLCSUZbB3vef Content-Disposition: form-data; name="model.site_title" ...... ------WebKitFormBoundaryBl1vjLCSUZbB3vef--

[Attack Type] Remote

[Impact Code execution] true

image-20211230142904370

image-20211230143416524 Click the Save button, because the developer does not filter the input parameters, the input malicious code is parsed and executed.

image-20211230143603563 Test the reflection cookie through XSS again. image-20211230143630795