[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] Open Redirection Vulnerability in Zurmo 3.2.6
From:       Daniel Bishtawi <daniel () netsparker ! com>
Date:       2019-07-25 9:42:20
Message-ID: CAKD6+R5M7uAKZb_E40KVb0vX-OGcDCAKeCcY-nfTOm2i-nPnAg () mail ! gmail ! com
[Download RAW message or body]

Hello,

We are informing you about the vulnerabilities in Zurmo 3.2.6.

Here are the details:

Information
--------------------
Advisory by Netsparker
Name: Open Redirection Vulnerability in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Open Redirection
Severity: Medium
Status: Not Fixed
Netsparker Advisory Reference: NS-19-012

Technical Details
--------------------

URL: http://
{DOMAIN}/zurmo/app/index.php/zurmo/default/toggleCollapse?returnUrl=
http://r87.com/?{DOMAIN}/
Parameter Name : returnUrl
Parameter Type : GET
Attack Pattern : http://r87.com/?{DOMAIN}/

For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-012-open-redirection-in-zurmo/

Regards,

Daniel Bishtawi
Marketing Administrator | Netsparker Web Application Security Scanner
Tel: +44 (0)20 3588 3843
Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn
<https://www.linkedin.com/company/netsparker-ltd> | Facebook
<https://facebook.com/netsparker>
<https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic