CVE-2021-39267

Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via a Content-Type Filter bypass to upload malicious files. This occurs because text/html is blocked, but other types that allow JavaScript execution (such as text/xml) are not blocked.
Configurations

Configuration 1 (hide)

cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:19

Type Values Removed Values Added
References () https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19 - Release Notes, Vendor Advisory () https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19 - Release Notes, Vendor Advisory
References () https://github.com/salesagility/SuiteCRM - Product, Third Party Advisory () https://github.com/salesagility/SuiteCRM - Product, Third Party Advisory
References () https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/ - Exploit, Third Party Advisory () https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/ - Exploit, Third Party Advisory

Information

Published : 2021-08-18 01:15

Updated : 2024-11-21 06:19


NVD link : CVE-2021-39267

Mitre link : CVE-2021-39267

CVE.ORG link : CVE-2021-39267


JSON object : View

Products Affected

salesagility

  • suitecrm
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')