First published: Sun Sep 17 2017(Updated: )
An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). The WebToLeadCapture functionality is found vulnerable to unauthenticated cross-site scripting (XSS) attacks. This attack vector is mitigated by proper validating the redirect URL values being passed along.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SugarCRM | <=7.7.2.2 | |
SugarCRM | =6.5.26 | |
SugarCRM | =7.8.0.0 | |
SugarCRM | =7.8.0.1 | |
SugarCRM | =7.8.1.0 | |
SugarCRM | =7.8.2.0 | |
SugarCRM | =7.8.2.1 | |
SugarCRM | =7.9.0.0 | |
SugarCRM | =7.9.0.1 | |
SugarCRM | =7.9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14510 has a medium severity rating due to its potential for unauthenticated cross-site scripting (XSS) attacks.
To mitigate CVE-2017-14510, upgrade SugarCRM to a patched version such as 7.7.2.3, 7.8.2.2, or 7.9.2.0.
CVE-2017-14510 affects SugarCRM versions before 7.7.2.3, 7.8.x before 7.8.2.2, 7.9.x before 7.9.2.0, and Sugar Community Edition 6.5.26.
CVE-2017-14510 facilitates unauthenticated cross-site scripting (XSS) attacks, which can lead to data theft or user impersonation.
Yes, performing a full system audit is recommended to ensure no other vulnerabilities exist after addressing CVE-2017-14510.