An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed inside the title and breadcrumb of a newly formed entity available to all the users. A malicious user can inject JavaScript in these values of an entity, thus stealing user cookies when someone visits the publicly accessible link.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5 | third party advisory patch |
https://github.com/espocrm/espocrm/releases/tag/5.6.9 | third party advisory release notes |
https://github.com/espocrm/espocrm/issues/1369 | third party advisory |
https://gauravnarwani.com/publications/cve-2019-14549/ | third party advisory exploit |