Vulnerability Details : CVE-2014-7986
install/index.php in EspoCRM before 2.6.0 allows remote attackers to re-install the application via a 1 value in the installProcess parameter.
Products affected by CVE-2014-7986
- cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-7986
1.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-7986
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-7986
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7986
-
http://www.securityfocus.com/archive/1/533844/100/0/threaded
SecurityFocus
-
https://www.htbridge.com/advisory/HTB23238
Multiple vulnerabilities in EspoCRM - HTB23238 Security Advisory | ImmuniWebExploit
-
http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html
EspoCRM 2.5.2 XSS / LFI / Access Control ≈ Packet StormExploit
-
http://blog.espocrm.com/news/espocrm-2-6-0-released
EspoCRM 2.6.0 released | EspoCRM | Open Source CRMPatch
-
http://www.securityfocus.com/bid/70811
EspoCRM '/install/index.php' Access Control Security Bypass VulnerabilityExploit
Jump to