Vulnerability Description
Directory traversal vulnerability in EspoCRM before 2.6.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter to install/index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Espocrm | Espocrm | <= 2.5.2 |
Related Weaknesses (CWE)
References
- http://blog.espocrm.com/news/espocrm-2-6-0-releasedPatch
- http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-ControlExploit
- http://www.securityfocus.com/archive/1/533844/100/0/threaded
- http://www.securityfocus.com/bid/70809Exploit
- https://www.htbridge.com/advisory/HTB23238Exploit
- http://blog.espocrm.com/news/espocrm-2-6-0-releasedPatch
- http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-ControlExploit
- http://www.securityfocus.com/archive/1/533844/100/0/threaded
- http://www.securityfocus.com/bid/70809Exploit
- https://www.htbridge.com/advisory/HTB23238Exploit
FAQ
What is CVE-2014-7985?
CVE-2014-7985 is a vulnerability with a CVSS score of 10.0 (HIGH). Directory traversal vulnerability in EspoCRM before 2.6.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter to install/index.php.
How severe is CVE-2014-7985?
CVE-2014-7985 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-7985?
Check the references section above for vendor advisories and patch information. Affected products include: Espocrm Espocrm.