An issue was discovered in EspoCRM before 5.6.9. Stored XSS in the body of an Article was executed when a victim opens articles received through mail. This Article can be formed by an attacker using the Knowledge Base feature in the tab list. The attacker could inject malicious JavaScript inside the body of the article, thus helping him steal victims' cookies (hence compromising their accounts).
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5 | third party advisory patch |
https://github.com/espocrm/espocrm/releases/tag/5.6.9 | third party advisory release notes |
https://github.com/espocrm/espocrm/issues/1369 | third party advisory |
https://gauravnarwani.com/publications/cve-2019-14548/ | third party advisory exploit |