CVE-2024-45960:
Zenario allows authenticated admin users to upload PDF files containing malicious code
4.8
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
tribalsystems/zenario | composer | <= 9.7.61188 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability chain involves two key components: 1) The document upload function (zenario_document_upload) fails to properly sanitize PDF content, allowing JavaScript injection via PDF OpenAction (CWE-434). 2) The Document Container module's rendering logic (renderViewButton) serves the malicious PDF without adequate output encoding or sandboxing, enabling XSS execution (CWE-79). The PoC demonstrates this through admin-uploaded PDFs triggering alerts when viewed, indicating insufficient validation at both upload and rendering stages. The high confidence in the upload function comes from explicit references to the document upload panel in attack steps, while the rendering function is inferred from the Document Container module's role in serving content.