An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed when a victim clicks on the Edit Dashboard feature present on the Homepage. An attacker can load malicious JavaScript inside the add tab list feature, which would fire when a user clicks on the Edit Dashboard button, thus helping him steal victims' cookies (hence compromising their accounts).
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5 | third party advisory patch |
https://github.com/espocrm/espocrm/releases/tag/5.6.9 | third party advisory release notes |
https://github.com/espocrm/espocrm/issues/1369 | third party advisory |
https://gauravnarwani.com/publications/cve-2019-14550/ | third party advisory exploit |