Headline
SugarCRM 12.2.0 SQL Injection
SugarCRM versions 12.2.0 and below suffer from multiple remote SQL injection vulnerabilities.
SugarCRM <= 12.2.0 Two SQL Injection Vulnerabilities
[-] Software Link:
https://www.sugarcrm.com
[-] Affected Versions:
Version 12.2.0 and prior versions.
Version 12.0.2 and prior versions.
Version 11.0.5 and prior versions.
[-] Vulnerabilities Description:
User input passed through the “metrics” parameter to the
“/Forecasts/metrics”
REST API endpoint is not properly sanitized before being used to
construct a SQL
query. This can be exploited by malicious users to e.g. read sensitive
data from
the database through in-band SQL Injection attacks.User input passed through the “placeholder_fields” parameter to the
e.g.
“/Notes/{recordID}/link/history” REST API endpoint is not properly
sanitized before
being used to construct a SQL query. This can be exploited by malicious
users to
e.g. read sensitive data from the database through in-band SQL Injection
attacks.
[-] Proof of Concept:
https://karmainsecurity.com/pocs/CVE-2023-35811_1.php
https://karmainsecurity.com/pocs/CVE-2023-35811_2.php
[-] Solution:
Upgrade to version 12.3.0, 12.0.3, 11.0.6, or later.
[-] Disclosure Timeline:
[14/02/2023] - Vendor notified
[12/04/2023] - Fixed versions released
[17/06/2023] - CVE number assigned
[23/08/2023] - Publication of this advisory
[-] CVE Reference:
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2023-35811 to these vulnerabilities.
[-] Credits:
Vulnerabilities discovered by Egidio Romano.
[-] Original Advisory:
https://karmainsecurity.com/KIS-2023-08
[-] Other References:
https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/
Related news
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected.