Summary
The host is installed with ZeroCMS and is prone to privilege escalation, cross-site scripting and sql injection vulnerabilities.
Impact
Successful exploitation will allow attacker to gain unauthorized privileges and manipulate SQL queries in the backend database allowing for the manipulation or disclosure of arbitrary data, execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
No solution or patch is available as of 9th February, 2015. Information regarding this issue will be updated once the solution details are available.
or updates refer to http://www.aas9.in/zerocms
Insight
Input passed via the 'article_id' GET parameter to zero_view_article.php script, 'access_level' POST parameter to zero_transact_user.php script and 'article_id' POST parameter to the zero_transact_article.php script is not properly sanitised before being used.
Affected
ZeroCMS version 1.0
Detection
Send a crafted data via HTTP GET request and check whether it is able execute sql query or not.
References
- http://packetstormsecurity.com/files/127005
- http://packetstormsecurity.com/files/127164
- http://packetstormsecurity.com/files/127262
- http://www.exploit-db.com/exploits/33702
- http://www.exploit-db.com/exploits/33743
- http://www.osvdb.com/107946
- http://www.osvdb.com/108025
- http://www.osvdb.com/108295
- http://www.osvdb.com/108475
- http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5186.php
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-4034, CVE-2014-4194, CVE-2014-4195 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities