[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKD6+R5M7uAKZb_E40KVb0vX-OGcDCAKeCcY-nfTOm2i-nPnAg@mail.gmail.com>
Date: Thu, 25 Jul 2019 11:42:20 +0200
From: Daniel Bishtawi <daniel@...sparker.com>
To: fulldisclosure@...lists.org, vuln@...unia.com,
submissions@...ketstormsecurity.org
Subject: [FD] Open Redirection Vulnerability in Zurmo 3.2.6
Hello,
We are informing you about the vulnerabilities in Zurmo 3.2.6.
Here are the details:
Information
--------------------
Advisory by Netsparker
Name: Open Redirection Vulnerability in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Open Redirection
Severity: Medium
Status: Not Fixed
Netsparker Advisory Reference: NS-19-012
Technical Details
--------------------
URL: http://
{DOMAIN}/zurmo/app/index.php/zurmo/default/toggleCollapse?returnUrl=
http://r87.com/?{DOMAIN}/
Parameter Name : returnUrl
Parameter Type : GET
Attack Pattern : http://r87.com/?{DOMAIN}/
For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-012-open-redirection-in-zurmo/
Regards,
Daniel Bishtawi
Marketing Administrator | Netsparker Web Application Security Scanner
Tel: +44 (0)20 3588 3843
Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn
<https://www.linkedin.com/company/netsparker-ltd> | Facebook
<https://facebook.com/netsparker>
<https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/>
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists