← Advisories

Zenario CMS 7.0.2d Reflected XSS and Open Redirect Vulnerabilities

Medium
Advisory ID
ZSL-2014-5207
Release Date
20 November 2014
Vendor
Tribal Ltd. - http://www.zenar.io
Affected Version
7.0.2d (Community Edition)
CVE
N/A
Tested On
Apache/2.4.7 (Win32), PHP/5.5.6, MySQL 5.6.14
Summary

Zenario is a web-based content management system for sites with one or many languages. It is simple to use, and can grow with your requirements.

Description

Input passed via the 'location' GET parameter in 'index.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain. Zenario suffers from multiple reflected cross-site scripting vulnerabilities as well. The issues are triggered when input passed via several parameters to 'ajax.php' script is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Proof of Concept
Disclosure Timeline
10.12.2014Vendor releases version 7.0.2e to address these issues.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
20.11.2014Initial release
21.11.2014Added reference [1] and [2]
25.11.2014Added reference [3], [4], [5], [6] and [7]
10.12.2014Added vendor status and reference [8]