EspoCRM version 5.6.4 is vulnerable to stored XSS due to lack of filtration of user-supplied data in the api/v1/Document functionality for storing documents in the account tab. An attacker can upload a crafted file that contains JavaScript code in its name. This code will be executed when a user opens a page of any profile with this.
References
Link | Resource |
---|---|
https://github.com/espocrm/espocrm/issues/1358 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-28T15:26:51
Updated: 2019-07-28T15:26:51
Reserved: 2019-07-28T00:00:00
Link: CVE-2019-14349
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-28T16:15:10.730
Modified: 2019-07-30T13:49:28.343
Link: CVE-2019-14349
JSON object: View
Redhat Information
No data.
CWE