Description
Zenar Content Management System contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating form parameters in POST requests. Attackers can inject script tags through the current_page parameter sent to the ajax.php endpoint, which reflects unsanitized user input in the response HTML to execute arbitrary JavaScript in victim browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Berk Dusunur
References
www.exploit-db.com/exploits/44664 (ExploitDB-44664)
demo.zenar.io (Official Product Homepage)
zenar.io/ (Product Reference)
www.vulncheck.com/...ystem-cross-site-scripting-via-ajax-php (VulnCheck Advisory: Zenar Content Management System Cross-Site Scripting via ajax.php)