4 Exploitable context-sensitive XSS flaws in jeesite4
asteinhauser opened this issue · 7 comments
Please, see 4 videos with concrete exploitations in the attachment.
jeesite.zip
<Connector IEncoding="utf-8" URIEncoding="utf-8" compressableMimeType="text/html,text/xml,text/javascript,text/css,text/plain,application/json,text/json" compression="on" compressionMinSize="100" connectionTimeout="20000" noCompressionUserAgents="gozilla, traviata" port="8080" protocol="HTTP/1.1" redirectPort="8443"/>
XSS flaws in jeesite4
We will try to deal with recently
Thanks for the info about encoding. However, the 4 vulnerabilities are independent of encoding. They are verifiable directly on your demo instance after logging in as system:admin - e.g.:
http://demo.jeesite.com/js/a/gen/genTable/form?tableName=%27;alert(342);var%20x=%27
We have filtered some XXS aggression, we'll try to deal with this kind of behavior under, thank you very much
@asteinhauser Thank you very much for your feedback, we will fix this problem in v4.1.1.
Fifth one just for the sake of completeness. This one is persistent:
jeesite5.zip