CVE-2017-18004

LOW3.5/ 10.0
Share:
Published: December 31, 2017 at 07:29 PM
Modified: April 20, 2025 at 01:37 AM
Source: cve@mitre.org

Vulnerability Description

Zurmo 3.2.3 allows XSS via the latitude or longitude parameter to maps/default/mapAndPoint.

CVSS Metrics

Base Score
3.5
Severity
LOW
Vector String
AV:N/AC:M/Au:S/C:N/I:P/A:N

Weaknesses (CWE)

Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Zurmo CRM 3.2.3 is vulnerable to a Cross-Site Scripting (XSS) attack, allowing attackers to inject malicious JavaScript code into the application. This vulnerability, exploitable through the latitude or longitude parameters of the maps/default/mapAndPoint endpoint, could lead to account compromise, data theft, or browser redirection for legitimate users.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious URL containing a specially crafted XSS payload within the latitude or longitude parameter of the maps/default/mapAndPoint endpoint. The payload is designed to execute arbitrary JavaScript code.

Step 2: User Interaction: The attacker either tricks a legitimate user into clicking the malicious URL or embeds the URL within a phishing email or a compromised website.

Step 3: Request Processing: When the user's browser accesses the malicious URL, the Zurmo application receives the request, including the attacker's XSS payload in the latitude or longitude parameter.

Step 4: Vulnerable Code Execution: The application's code fails to sanitize or encode the latitude or longitude parameter before rendering the map. The attacker's JavaScript payload is directly embedded into the HTML output.

Step 5: Payload Execution: The user's browser executes the injected JavaScript code. This code can perform various malicious actions, such as stealing session cookies, redirecting the user to a phishing site, or modifying the content of the page.

03 // Deep Technical Analysis

The vulnerability lies in the lack of proper input validation and output encoding for the latitude and longitude parameters within the Zurmo CRM application. Specifically, the application fails to sanitize user-supplied input before rendering it on the map display. This allows an attacker to inject arbitrary HTML and JavaScript code into these parameters. When a user views the map, the injected script executes within the context of the user's browser, enabling the attacker to perform actions on behalf of the user, such as stealing session cookies, redirecting the user to a phishing site, or modifying the content of the page. The root cause is a missing or inadequate implementation of input validation and output encoding (e.g., HTML escaping) when handling user-provided latitude and longitude values. The application directly uses the user-supplied input without sanitization, leading to the XSS vulnerability.

CVE-2017-18004 - LOW Severity (3.5) | Free CVE Database | 4nuxd