An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed when a victim clicks on the Edit Dashboard feature present on the Homepage. An attacker can load malicious JavaScript inside the add tab list feature, which would fire when a user clicks on the Edit Dashboard button, thus helping him steal victims' cookies (hence compromising their accounts).
References
Link | Resource |
---|---|
https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5 | Patch Third Party Advisory |
https://gauravnarwani.com/publications/cve-2019-14550/ | Exploit Third Party Advisory |
https://github.com/espocrm/espocrm/issues/1369 | Third Party Advisory |
https://github.com/espocrm/espocrm/releases/tag/5.6.9 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2019-08-05 12:15
Updated : 2019-08-09 12:54
NVD link : CVE-2019-14550
Mitre link : CVE-2019-14550
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
espocrm
- espocrm