Vulnerability Details : CVE-2014-7985
Potential exploit
Directory traversal vulnerability in EspoCRM before 2.6.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter to install/index.php.
Vulnerability category: Directory traversal
Products affected by CVE-2014-7985
- cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-7985
2.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-7985
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2014-7985
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7985
-
http://www.securityfocus.com/archive/1/533844/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/bid/70809
EspoCRM '/install/index.php' Remote File Include VulnerabilityExploit
-
https://www.htbridge.com/advisory/HTB23238
Multiple vulnerabilities in EspoCRM - HTB23238 Security Advisory | ImmuniWebExploit
-
http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html
EspoCRM 2.5.2 XSS / LFI / Access Control ≈ Packet StormExploit
-
http://blog.espocrm.com/news/espocrm-2-6-0-released
EspoCRM 2.6.0 released | EspoCRM | Open Source CRMPatch
Jump to