First published: Thu Feb 29 2024(Updated: )
EspoCRM is an Open Source Customer Relationship Management software. An attacker can inject arbitrary IP or domain in "Password Change" page and redirect victim to malicious page that could lead to credential stealing or another attack. This vulnerability is fixed in 8.1.2.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
EspoCRM | <8.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24818 is considered a high severity vulnerability due to the potential for credential stealing attacks.
To fix CVE-2024-24818, upgrade EspoCRM to version 8.1.2 or above.
CVE-2024-24818 exploits the 'Password Change' page by allowing attackers to inject arbitrary IPs or domains.
The risks associated with CVE-2024-24818 include potential redirects to malicious sites leading to credential theft.
CVE-2024-24818 affects versions of EspoCRM prior to 8.1.2.