Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLThoY20tamo0eC00Z21y
reflected XSS in tribalsystems/zenario
Reflected XSS in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting into the "cID" parameter when creating a new HTML component.
Permalink: https://github.com/advisories/GHSA-8hcm-jj4x-4gmrJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLThoY20tamo0eC00Z21y
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 3 months ago
CVSS Score: 4.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-8hcm-jj4x-4gmr, CVE-2021-27673
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-27673
- https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38
- https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370
- http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html
- https://github.com/advisories/GHSA-8hcm-jj4x-4gmr
Affected Packages
packagist:tribalsystems/zenario
Versions: < 8.8.53370Fixed in: 8.8.53370