CSV Injection in Create Contacts in EspoCRM 7.1.8 allows remote authenticated users to run system commands via creating contacts with payloads capable of executing system commands. Admin user exporting contacts in CSV file may end up executing the malicious system commands on his system.
References
Link | Resource |
---|---|
https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76 | Exploit Third Party Advisory |
https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76 - Exploit, Third Party Advisory |
Information
Published : 2022-09-16 14:15
Updated : 2024-11-21 07:17
NVD link : CVE-2022-38844
Mitre link : CVE-2022-38844
CVE.ORG link : CVE-2022-38844
JSON object : View
Products Affected
espocrm
- espocrm
CWE
CWE-1236
Improper Neutralization of Formula Elements in a CSV File