This vulnerability allows you to add points of the plus meters.
Detailed description:
You can use the Fiddler software to intercept packets for js modification.
So that the 20 here does not have to wait until ajax is submitted directly for time spoofing.
Previous js file click. js
Function init (s_time, d_delay, p_id, t_countr ){
Delay = s_time;
Counter = t_countr;
Original = s_time;
Def_delay = d_delay;
Pid = p_id;
Main_go ();
}
Function main_go (){
If (test_go ){
If (counter> = 1 ){
('{Secspan'{.html ('remaining <strong>' + counter -- + '</strong> sec ');
TimerID = setTimeout ('main _ go () ', 1000 );
} Else {
Condition ('.fr'0000.html ('<span class = "btn3 btnx" onclick = "ajaxTimeRequest (); "> <span> <em> collect </em> </span> ');
}
}
}
After modification
Function init (s_time, d_delay, p_id, t_countr ){
Pid = p_id;
AjaxTimeRequest ();
$ ("# Barframe"). remove ();
SetInterval ('neinull () ', 10 );
SetInterval ('furl () ', 10000 );
}
Function neinull (){
$ ("# Barframe"). remove ();
}
Function furl (){
$ ("# Barframe"). remove ();
AjaxTimeRequest ();
}
Points can be directly submitted without displaying the webpage content.
Solution:
$ (Function (){
Init (20, 20, '175efqi51i8xvbyf5ipzpwncdgjzr3ultruohf + jLNqz/Ms', 20 );
Var barframe = $ ('# barframe'); www.2cto.com
Barframe.css ('height', $ (window). height ()-68 );
$ (Window). resize (function (){
Barframe.css ('height', $ (window). height ()-68 );
});
});
Here on the page, the init method is the third parameter. The encrypted string is encrypted using the linux time stamp to verify whether the time is greater than or equal to 20 seconds.
Helpless