Brief description: XSS + background upload, you know
Detailed Description: Siteserver XSS + webshell is randomly generated in the background
Test version: SiteServer V3.4.3
1. For the stored XSS website, www.xxx.com/UserCenter/main.aspx, click post, edit, click source code-> insert an XSSS section, such as "> <script> alert (22222222222) </script>, and click Save, OK. submit it to the postmaster for review. When the postmaster logs on to the background, choose content review> click View To Go To The xss console.
2. You can generate a webshell in the background. For more information, see "template management"> "add a single-page template" or "add another template"> change the file extension to aspx. The template file is T_xx00, which is directly written to webshell, access www.xxx.com/Template/T_xx00.aspx
Haha, it once again shows the power of chicken assists, which is more lethal than the previous one, generally, the post administrator will review and post the document you uploaded (or do you want to post an article such as xx00). Therefore, the universality and usability of this XSS trigger are much greater, causing greater harm.
Proof of vulnerability:
Solution: too many rights at the website background