Description
|
|
Multiple vulnerabilities have been discovered in ZeroCMS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting, script insertion, and SQL injection attacks.
1) Input passed via the "article_id" GET parameter to zero_view_article.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Note: This further can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) The application does not properly restrict access to zero_transact_user.php script, which can be exploited to access otherwise restricted operations and subsequently gain escalated privileges.
3) Input passed via the "article_id" GET parameter to zero_transact_article.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
4) Input passed via the "name" POST parameter to zero_transact_user.php when creating an account is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
The vulnerabilities are confirmed in version 1.0. Other versions may also be affected.
|