An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed inside the title and breadcrumb of a newly formed entity available to all the users. A malicious user can inject JavaScript in these values of an entity, thus stealing user cookies when someone visits the publicly accessible link.
References
Link | Resource |
---|---|
https://gauravnarwani.com/publications/cve-2019-14549/ | Exploit Third Party Advisory |
https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5 | Patch Third Party Advisory |
https://github.com/espocrm/espocrm/issues/1369 | Third Party Advisory |
https://github.com/espocrm/espocrm/releases/tag/5.6.9 | Release Notes Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-08-05T18:48:46
Updated: 2019-08-05T18:48:46
Reserved: 2019-08-02T00:00:00
Link: CVE-2019-14549
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-08-05T19:15:11.507
Modified: 2019-08-09T19:57:07.067
Link: CVE-2019-14549
JSON object: View
Redhat Information
No data.
CWE