First published: Fri Sep 16 2022(Updated: )
CSV Injection in Create Contacts in EspoCRM 7.1.8 allows remote authenticated users to run system commands via creating contacts with payloads capable of executing system commands. Admin user exporting contacts in CSV file may end up executing the malicious system commands on his system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EspoCRM | =7.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38844 is a vulnerability in EspoCRM 7.1.8 that allows remote authenticated users to run system commands via creating contacts with payloads capable of executing system commands.
CVE-2022-38844 allows remote authenticated users to run system commands on the system by creating contacts with payloads that can execute system commands.
CVE-2022-38844 has a severity rating of high (8 out of 10).
To mitigate CVE-2022-38844, it is recommended to update EspoCRM to a version that is not affected by this vulnerability, if available. Additionally, it is important to sanitize user-generated content and implement input validation and filtering to prevent CSV injection.
More information about CVE-2022-38844 can be found at the following reference: [link](https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76).