magento app/design/adminhtml/default/default/template/sales/order/view/info.phtml XSS Vul

Andrew.Hann發表於2016-02-02

catalogue

1. 漏洞描述
2. 漏洞觸發條件
3. 漏洞影響範圍
4. 漏洞程式碼分析
5. 防禦方法
6. 攻防思考

 

1. 漏洞描述

Relevant Link:

http://www.freebuf.com/vuls/94277.html


2. 漏洞觸發條件

0x1: POC

">alert(1);"@sucuri.net


3. 漏洞影響範圍
4. 漏洞程式碼分析

app/design/adminhtml/default/default/template/sales/order/view/info.phtml

<!-- template會將getcustomeremail方法的返回值(即使用者填入的郵箱地址)傳遞到管理皮膚上 -->
<tr>
    <td class="label"><label><?php echo Mage::helper('sales')->__('Email') ?></label></td>
    <td class="value"><a href="mailto:<?php echo $_order->getCustomerEmail() ?>"><strong><?php echo $_order->getCustomerEmail() ?></strong></a></td>
</tr>


5. 防禦方法

app/design/adminhtml/default/default/template/sales/order/view/info.phtml

<tr>
    <td class="label"><label><?php echo Mage::helper('sales')->__('Email') ?></label></td>
    <!-- <td class="value"><a href="mailto:<?php echo $_order->getCustomerEmail() ?>"><strong><?php echo $_order->getCustomerEmail() ?></strong></a></td> -->
    <td class="value"><a href="mailto:<?php echo htmlspecialchars($_order->getCustomerEmail()) ?>"><strong><?php echo htmlspecialchars($_order->getCustomerEmail()) ?></strong></a></td>
</tr>


6. 攻防思考

Copyright (c) 2016 Little5ann All rights reserved

 

相關文章