First published: Thu Mar 19 2020(Updated: )
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the addresses/ URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Frappe ERPNext | =11.1.47 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-20515 is high (6.1).
ERPNext 11.1.47 allows reflected XSS by not properly sanitizing user input in the PATH_INFO parameter of the addresses/ URI, which can be exploited by an attacker to inject and execute malicious scripts.
You can check if your ERPNext version is affected by CVE-2019-20515 by verifying if it is version 11.1.47.
The Common Weakness Enumeration (CWE) ID associated with CVE-2019-20515 is CWE-79.
You can find more information about CVE-2019-20515 at the following link: [https://www.netsparker.com/web-applications-advisories/ns-19-017-cross-site-scripting-in-erpnext/]