header-logo
Suggest Exploit
vendor:
Zorum
by:
SecurityFocus
8.8
CVSS
HIGH
HTML Injection, Cross-Site Scripting, SQL Injection, Authentication Bypass
79,80,89,287
CWE
Product Name: Zorum
Affected Version From: 3.5
Affected Version To: 3.5
Patch Exists: YES
Related CWE: N/A
CPE: //a:zorum:zorum_3_5
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: UNIX, Linux, and any other platform that supports PHP script execution
2005

Zorum Multiple Vulnerabilities

Zorum is a freely available, open source Web-based forum application implemented in PHP. It is vulnerable to multiple remote vulnerabilities due to a failure of the application to validate access rights and user-supplied input. An attacker may leverage these issues to execute script code in an unsuspecting user's browser, to manipulate SQL queries and to bypass authentication requirements.

Mitigation:

Ensure that user-supplied input is properly validated and access rights are properly enforced.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12777/info

Zorum is a freely available, open source Web-based forum application implemented in PHP. It is available for UNIX, Linux, and any other platform that supports PHP script execution.

Multiple remote vulnerabilities affect Zorum. These issues are due to a failure of the application to validate access rights and user-supplied input.

The issues reported are an HTML injection vulnerability, multiple cross-site scripting vulnerabilities, an SQL injection vulnerability, and an authentication bypass issue.

An attacker may leverage these issues to execute script code in an unsuspecting user's browser, to manipulate SQL queries and to bypass authentication requirements.

http://www.example.com/zorum_3_5/index.php?list="/><script>alert()</script>
http://www.example.com/zorum_3_5/index.php?method=markread&list=zorumuser&fromlist=secmenu&frommethod="/><script>alert()</script>