Description
EspoCRM version 5.6.4 is vulnerable to stored XSS due to lack of filtration of user-supplied data in the api/v1/Document functionality for storing documents in the account tab. An attacker can upload a crafted file that contains JavaScript code in its name. This code will be executed when a user opens a page of any profile with this.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5565 | EspoCRM version 5.6.4 is vulnerable to stored XSS due to lack of filtration of user-supplied data in the api/v1/Document functionality for storing documents in the account tab. An attacker can upload a crafted file that contains JavaScript code in its name. This code will be executed when a user opens a page of any profile with this. |
References
| Link | Providers |
|---|---|
| https://github.com/espocrm/espocrm/issues/1358 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:12:43.288Z
Reserved: 2019-07-28T00:00:00.000Z
Link: CVE-2019-14349
No data.
Status : Modified
Published: 2019-07-28T16:15:10.730
Modified: 2024-11-21T04:26:33.713
Link: CVE-2019-14349
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD