Miggo Logo

CVE-2022-3005: YetiForce CRM vulnerable to stored Cross-site Scripting via SlaPolicy module

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.315%
Published
9/21/2022
Updated
1/30/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
yetiforce/yetiforce-crmcomposer<= 6.4.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing output encoding in template files handling SLA Policy data. The patch adds |escape filters and Purifier::encodeHtml calls to these exact locations. The affected template files (CustomConditions.tpl and EditViewBlocks.tpl) contained direct output of user-controlled values in HTML contexts without proper sanitization, making them vulnerable to stored XSS. The JavaScript changes in Detail.js further indicate the frontend relied on properly sanitized backend output.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Y*ti*or** *RM v*rsions *.*.* *n* prior *r* vuln*r**l* to *ross-sit* s*riptin* vi* t** `Sl*Poli*y` mo*ul*. * p*t** is *v*il**l* *t *ommit ****************************************.

Reasoning

T** vuln*r**ility st*ms *rom missin* output *n*o*in* in t*mpl*t* *il*s **n*lin* SL* Poli*y **t*. T** p*t** ***s |*s**p* *ilt*rs *n* Puri*i*r::*n*o***tml **lls to t**s* *x**t lo**tions. T** *****t** t*mpl*t* *il*s (*ustom*on*itions.tpl *n* **itVi*w*lo