CVE-2021-39267
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via a Content-Type Filter bypass to upload malicious files. This occurs because text/html is blocked, but other types that allow JavaScript execution (such as text/xml) are not blocked.
Una vulnerabilidad de tipo cross-site scripting (XSS) persistente en la interfaz web de SuiteCRM versiones anteriores a 7.11.19; permite a un atacante remoto introducir JavaScript arbitrario por medio de una omisión del filtro Content-Type para cargar archivos maliciosos. Esto ocurre porque text/html está bloqueado, pero otros tipos que permiten una ejecución de JavaScript (como text/xml) no están bloqueados.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-18 CVE Reserved
- 2021-08-18 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/salesagility/SuiteCRM | Product |
URL | Date | SRC |
---|---|---|
https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19 | 2021-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Salesagility Search vendor "Salesagility" | Suitecrm Search vendor "Salesagility" for product "Suitecrm" | < 7.11.19 Search vendor "Salesagility" for product "Suitecrm" and version " < 7.11.19" | - |
Affected
|