vendor:
ZeewaysCMS
by:
Zeroscience
7,5
CVSS
HIGH
Directory Traversal and Cross Site Scripting (Stored)
22 (Path Traversal) and 79 (Cross-site Scripting)
CWE
Product Name: ZeewaysCMS
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apache/2.2.27, PHP/5.4.28
2016
ZeewaysCMS Multiple Vulnerabilities
ZeewaysCMS suffers from a file inclusion vulnerability (LFI) when encoded input passed thru the 'targeturl' GET parameter is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks and URL encoded NULL bytes. Multiple cross-site scripting vulnerabilities were also discovered. The issue is triggered when input passed via multiple parameters is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Mitigation:
Input validation and sanitization should be done to prevent directory traversal and cross-site scripting attacks.