Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via a Content-Type Filter bypass to upload malicious files. This occurs because text/html is blocked, but other types that allow JavaScript execution (such as text/xml) are not blocked.
References
Link | Resource |
---|---|
https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19 | Release Notes Vendor Advisory |
https://github.com/salesagility/SuiteCRM | Product Third Party Advisory |
https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-18T00:30:16
Updated: 2021-08-18T00:30:16
Reserved: 2021-08-18T00:00:00
Link: CVE-2021-39267
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-18T01:15:06.147
Modified: 2021-08-24T12:52:13.297
Link: CVE-2021-39267
JSON object: View
Redhat Information
No data.
CWE