Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
Proof of concept:
Step1: Login into the CRM and in the mailbox use the link for entering the malicious javascript into it and save it as a draft message and whenever you open the draft msg the malicious javascript will get executed.
Affected software: EspoCRM-5.3.6
Type of vulnerability: Stored XSS
Discovered by: BreachLock
Website: https://www.breachlock.com
Author: Balvinder Singh
Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
Proof of concept:
Step1: Login into the CRM and in the mailbox use the link for entering the malicious javascript into it and save it as a draft message and whenever you open the draft msg the malicious javascript will get executed.
VulnerableURL: http://localhost/EspoCRM-5.3.6/EspoCRM-5.3.6/#Email/view/5b962f8e6f2e91033
The text was updated successfully, but these errors were encountered: