CVE-2019-9078

zzcms 2019 has XSS via an arbitrary user/ask.php?do=modify parameter because inc/stopsqlin.php does not block a mixed-case string such as sCrIpT.
References
Link Resource
https://github.com/NS-Sp4ce/ZZCMS-XSS/blob/master/xss.md Exploit Third Party Advisory
https://github.com/NS-Sp4ce/ZZCMS-XSS/blob/master/xss.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zzcms:zzcms:2019:*:*:*:*:*:*:*

History

21 Nov 2024, 04:50

Type Values Removed Values Added
References () https://github.com/NS-Sp4ce/ZZCMS-XSS/blob/master/xss.md - Exploit, Third Party Advisory () https://github.com/NS-Sp4ce/ZZCMS-XSS/blob/master/xss.md - Exploit, Third Party Advisory

Information

Published : 2019-02-24 17:29

Updated : 2024-11-21 04:50


NVD link : CVE-2019-9078

Mitre link : CVE-2019-9078

CVE.ORG link : CVE-2019-9078


JSON object : View

Products Affected

zzcms

  • zzcms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')