exploit the possibilities

Zurmo 3.2.6 Persistent Cross Site Scripting

Zurmo 3.2.6 Persistent Cross Site Scripting
Posted Jul 26, 2019
Authored by Daniel Bishtawi, Umran Yildirimkaya | Site netsparker.com

Zurmo version 3.2.6 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 352b6bea16887100d57ed569f714b775

Zurmo 3.2.6 Persistent Cross Site Scripting

Change Mirror Download

Stored Cross-site Scripting Vulnerability in Zurmo 3.2.6

Information
--------------------

Advisory by Netsparker
Name: Stored Cross-site Scripting in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Stored Cross-site Scripting
Severity: Medium
Status: Not Fixed
Netsparker Advisory Reference: NS-19-010

Technical Details
--------------------

URL : http://{DOMAIN}/zurmo/app/index.php/zurmo/group
Injection URL : http://{DOMAIN}/zurmo/app/index.php/zurmo/group/edit?id=11
Parameter Name : Group_bname%5d
Parameter Type : POST
Attack Pattern : <scRipt>alert(‘storedXSS’)</scRipt>

Proof-of-Concept
--------------------

Visit http://{DOMAIN}/zurmo/app/index.php/zurmo/group/create and enter a random group name and save it. Edit the new group from http://{DOMAIN}/zurmo/app/index.php/zurmo/group and replace the name with the attack pattern. Save and navigate back to http://{DOMAIN}/zurmo/app/index.php/zurmo/group . You’ll see the XSS pop up.

Advisory Timeline
--------------------

17th May 2019 - First Attempted Contact
25th July 2019 - Advisory Released

Credits & Authors
--------------------

These issues have been discovered by Umran Yildirimkaya while testing the Netsparker Web Application Security Scanner.

About Netsparker
--------------------

Netsparker web application security scanner finds and reports security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications, regardless of the platform and technology they are built on. Netsparker scanning engine’s unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close