Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2014-7985 CVE-2014-7986 CVE-2014-7987 CVE-2014-8330 |
CWE-ID | CWE-22 CWE-284 CWE-79 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #2 is available. |
Vulnerable software Subscribe |
EspoCRM Web applications / CRM systems |
Vendor | EspoCRM |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU19500
Risk: Medium
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2014-7985
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences passed via the "action" parameter to install/index.php. A remote attacker can send a specially crafted HTTP request and view contents of arbitrary file on the system.
Install update from vendor's website.
Vulnerable software versionsEspoCRM: 2.0.0 - 5.2.5
External linkshttp://blog.espocrm.com/news/espocrm-2-6-0-released
http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html
http://www.securityfocus.com/archive/1/533844/100/0/threaded
http://www.securityfocus.com/bid/70809
http://www.htbridge.com/advisory/HTB23238
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU19501
Risk: Medium
CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]
CVE-ID: CVE-2014-7986
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to reinstall application.
The vulnerability exists due to improper access restrictions to the install/index.php installation script. A remote attacker can reinstall the application by modifying the "installProcess" parameter.
MitigationInstall updates from vendor's website.
Vulnerable software versionsEspoCRM: 1.0.0 - 2.5.2
External linkshttp://blog.espocrm.com/news/espocrm-2-6-0-released
http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html
http://www.securityfocus.com/archive/1/533844/100/0/threaded
http://www.securityfocus.com/bid/70811
http://www.htbridge.com/advisory/HTB23238
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU19502
Risk: Low
CVSSv3.1: 3.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2014-7987
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionVulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in EspoCRM before 2.6.0 when processing desc parameter in an errors action to install/index.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsEspoCRM: 2.0.0 - 2.5.2
External linkshttp://blog.espocrm.com/news/espocrm-2-6-0-released
http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html
http://www.securityfocus.com/archive/1/533844/100/0/threaded
http://www.securityfocus.com/bid/70806
http://www.htbridge.com/advisory/HTB23238
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU19503
Risk: Low
CVSSv3.1: 5.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2014-8330
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionVulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error when processing a Name field in a new account. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsEspoCRM: 2.0.0 - 2.5.2
External linkshttp://packetstormsecurity.com/files/127827/Espo-CRM-Cross-Site-Scripting.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.