ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the user/ URI, as demonstrated by a crafted e-mail address.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.netsparker.com/web-applications-advisories/ns-19-017-cross-site-scripting-in-erpnext/ | third party advisory exploit |