If you want to watch other video websites of "China good voice", it seems that there is no copyright to play. Then, I went to Sohu and saw a lot of people and the traffic was huge. If there is an XSS in this position, is it awesome? It can also call any external js file ~ Detailed Description: unexpectedly, the comment box exists in xss and is basically not filtered. Attackers can call external js files at will. Due to some problems with sae, xsser. me cannot be used for the time being. Therefore, it is impossible to capture the cookie graph. Hazard: Look at the first figure below. After the code is inserted, as long as one person replies, the original webpage will generate another script to call the external js Code, therefore, the xss code becomes invalid because the xss message is not displayed. Proof of vulnerability: Ah, there are too many people to comment on, which is a little difficult. Fortunately, I have two quick answers. 1. Call an external js file. The inserted exploitation code <textarea/> "> 2. Insert Baidu homepage. Insert exploitation code <textarea/> <iframe src = http://www.baidu.com/> </iframe>
Solution:
Filter xss special characters