GithubHelp home page GithubHelp logo

lixin-wei / hznuoj Goto Github PK

View Code? Open in Web Editor NEW
58.0 6.0 11.0 17.68 MB

Hangzhou Normal University Online Judge

Home Page: http://acm.hznu.edu.cn

License: GNU General Public License v3.0

Shell 0.22% C++ 2.22% Makefile 0.28% C 10.33% Lex 0.62% HTML 0.19% CSS 16.93% JavaScript 39.49% PHP 27.99% Roff 0.16% PLSQL 0.21% Objective-C 0.30% Hack 0.05% PLpgSQL 1.00% Dockerfile 0.01%
online-judge onlinejudge acm-icpc hznu

hznuoj's Issues

Insufficient SQL filtering results in xss injection

description

The code problem occurred in OJ / admin-tools / cal_scores.php. The $ realname in the output form was obtained from the database. There was no filtering of angle brackets “<>” during registration, which caused the reorganization here. xss injection

image-20200225160853304

Attack process

首先注册一个账号,Class为"软工163",Real Name is 
<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>

image-20200225160712343

Then visit / OJ / admin-tools / cal_scores.php, set the classList to soft 软工163, and click submit

image-20200225161720115

the attack works

image-20200225161824168

poc

<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>

Strict SQL filtering leads to xss injection vulnerability

description

The code problem occurred in OJ / admin-tools / cal_scores.php. The $ realname in the output form was obtained from the database. There was no filtering of angle brackets “<>” during registration, which caused the reorganization here. xss injection

image-20200225160853304

Attack process

First register an account on the /OJ/modifypage.php page,Class is "软工163",Real Name is 
<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>

image-20200225162702052

Then visit / OJ / admin-tools / cal_scores.php, set the classList to soft 软工163, and click submit

image-20200225162722101

the attack works

image-20200225162808498

poc

<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>

docker镜像里面无法上传测试数据

docker镜像里面无法上传测试数据,提示上传失败
添加题目的时候有添加sample data,但test data里面没看到in和out的文件
请问下怎么解决,是哪个文件夹权限的问题吗?

Strict filtering of SQL statements causes xss injection

description

The code problem occurred in OJ / admin-tools / cal_scores.php. The $ realname in the output form was obtained from the database. There was no filtering of angle brackets “<>” during registration, which caused the reorganization here. xss injection

image-20200225160853304

Attack process

首先注册一个账号,Class为"软工163",Real Name is 
<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>

image-20200225162702052

Then visit / OJ / admin-tools / cal_scores.php, set the classList to soft 软工163, and click submit

image-20200225162722101

the attack works

image-20200225162808498

poc

<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.