CVE-2024-50335

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50335
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50335.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50335
Aliases
Published
2024-11-05T19:15:07Z
Modified
2025-02-14T11:54:27.189831Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. The "Publish Key" field in SuiteCRM's Edit Profile page is vulnerable to Reflected Cross-Site Scripting (XSS), allowing an attacker to inject malicious JavaScript code. This can be exploited to steal CSRF tokens and perform unauthorized actions, such as creating new administrative users without proper authentication. The vulnerability arises due to insufficient input validation and sanitization of the Publish Key field within the SuiteCRM application. When an attacker injects a malicious script, it gets executed within the context of an authenticated user's session. The injected script (o.js) then leverages the captured CSRF token to forge requests that create new administrative users, effectively compromising the integrity and security of the CRM instance. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/salesagility/suitecrm

Affected ranges

Type
GIT
Repo
https://github.com/salesagility/suitecrm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/salesagility/suitecrm-core
Events

Affected versions

7.*

7.2.2
7.9.15
7.9.6

v.*

v.7.9.11

v7.*

v7.0.1
v7.0.2
v7.1
v7.1.1
v7.1.2
v7.1.3
v7.1.4
v7.1.5
v7.10-RC
v7.10-RC-2
v7.10-beta
v7.10-beta-2
v7.10-beta-3
v7.10.0
v7.10.1
v7.10.10
v7.10.11
v7.10.12
v7.10.13
v7.10.14
v7.10.15
v7.10.16
v7.10.17
v7.10.18
v7.10.19
v7.10.2
v7.10.20
v7.10.21
v7.10.22
v7.10.23
v7.10.3
v7.10.4
v7.10.5
v7.10.6
v7.10.7
v7.10.8
v7.10.9
v7.11-beta
v7.11-rc
v7.11-rc-2
v7.11.0
v7.11.1
v7.11.10
v7.11.11
v7.11.12
v7.11.13
v7.11.14
v7.11.15
v7.11.16
v7.11.17
v7.11.18
v7.11.19
v7.11.2
v7.11.20
v7.11.21
v7.11.22
v7.11.3
v7.11.4
v7.11.5
v7.11.6
v7.11.7
v7.11.8
v7.11.9
v7.12-rc
v7.12.0
v7.12.1
v7.12.10
v7.12.11
v7.12.12
v7.12.2
v7.12.3
v7.12.4
v7.12.5
v7.12.6
v7.12.7
v7.12.8
v7.12.9
v7.13.0
v7.13.0-beta
v7.13.1
v7.13.2
v7.13.3
v7.13.4
v7.14.0
v7.14.0-beta
v7.14.1
v7.14.2
v7.14.3
v7.14.4
v7.14.5
v7.1RC
v7.1RC2
v7.1beta
v7.1beta2
v7.2
v7.2.1
v7.2.2
v7.2.3
v7.2.4
v7.2beta
v7.2beta2
v7.2beta3
v7.3
v7.3-beta
v7.3.1
v7.3.2
v7.3beta3
v7.4
v7.4-beta
v7.4-beta.2
v7.4.1
v7.4.2
v7.4.3
v7.5-beta
v7.5-beta.2
v7.5-rc
v7.5.1
v7.5.2
v7.5.3
v7.6
v7.6-beta-1
v7.6-beta.2
v7.6-rc
v7.6.1
v7.6.2
v7.6.3
v7.6.4
v7.6.5
v7.6.6
v7.7
v7.7-beta1
v7.7-beta2
v7.7-rc
v7.7-rc2
v7.7.1
v7.7.2
v7.7.3
v7.7.4
v7.7.5
v7.7.6
v7.7.7
v7.7.8
v7.7.9
v7.8.0
v7.8.0-beta
v7.8.0-beta.2
v7.8.0-rc
v7.8.1
v7.8.10
v7.8.11
v7.8.12
v7.8.13
v7.8.14
v7.8.15
v7.8.16
v7.8.17
v7.8.18
v7.8.19
v7.8.2
v7.8.20
v7.8.3
v7.8.4
v7.8.5
v7.8.6
v7.8.7
v7.8.8
v7.8.9
v7.9.0
v7.9.0-beta
v7.9.0-rc
v7.9.1
v7.9.10
v7.9.11
v7.9.12
v7.9.13
v7.9.14
v7.9.16
v7.9.17
v7.9.2
v7.9.3
v7.9.4
v7.9.5
v7.9.7
v7.9.8
v7.9.9

v8.*

v8.0.0
v8.0.1
v8.0.2
v8.0.3
v8.0.4
v8.1.0
v8.1.1
v8.1.2
v8.1.3
v8.2.0
v8.2.0-beta.2
v8.2.1
v8.2.2
v8.2.3
v8.2.4
v8.3.0
v8.3.1
v8.4.0
v8.4.0-beta
v8.4.1
v8.4.2
v8.5.0
v8.5.1
v8.6.0
v8.6.1
v8.6.2
v8.7.0
v8.7.0-beta