Authenticated Blind & Error based SQL injection and Reflected XSS on Zenario 8.8.52729 CMS (CVE-2021–27672, CVE-2021–27673)

Deadshot
2 min readFeb 22, 2021

--

Product: Zenario 8.8.52729

Vulnerability Title: Authenticated Blind & Error SQLi and Reflected XSS

Identifier: Owasp Top 10: Injection, Cross-Site Scripting

Detailed description: It was found that when we create a new HTML page using the admin login, admin_boxes.ajax.php is given a POST request containing cID and with all other parameters. Whereas, cID is the parameter that is vulnerable to SQLi. As a CMS admin, a user can dump all the data from the database. Also, the same cID parameter is vulnerable to Reflected XSS.

Steps to reproduce:

1. Login to the admin page of Zenario CMS, which is http://server_ip/zenario/admin.php

The admin login page

2. Click on, New → HTML page and intercept it with your burpsuite.

3. Just a single quote on cID parameter will confirm the SQL injection as below shown image

The SQL error against the parameter cID
The SQL error against the parameter cID

4. After confirming that cID is vulnerable to SQL injection feeding the request to SQLMAP will do the rest of the work for you.

The result of SQLMAP against the cID parameter

5. Input the html tag as <script>alert(“xss”)</script> on the same cID parameter will confirm that is vulnerable to Reflected XSS.

XSS payload on CID parameter
Reflected XSS is confirmed

Reported date: 05–02–2021

Fixed date: 08–02–2021

Fixed Version: Zenario 8.8.53370

Discoverer: Avinash R — Zacco Cyber Security Research Labs, Coimbatore, India.

CVE: CVE-2021–27672(SQLi), CVE-2021–27673 (Rxss)

Fixed CMS: https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370

Vulnerable CMS: https://github.com/TribalSystems/Zenario/releases/tag/8.8

--

--

Deadshot
Deadshot

Written by Deadshot

A security consultant with technical and consulting experience in the information security domain.

No responses yet