Security
Headlines
HeadlinesLatestCVEs

Headline

SugarCRM 12.2.0 SQL Injection

SugarCRM versions 12.2.0 and below suffer from multiple remote SQL injection vulnerabilities.

Packet Storm
#sql#vulnerability#php#perl

SugarCRM <= 12.2.0 Two SQL Injection Vulnerabilities

[-] Software Link:

https://www.sugarcrm.com

[-] Affected Versions:

Version 12.2.0 and prior versions.
Version 12.0.2 and prior versions.
Version 11.0.5 and prior versions.

[-] Vulnerabilities Description:

  1. User input passed through the “metrics” parameter to the
    “/Forecasts/metrics”
    REST API endpoint is not properly sanitized before being used to
    construct a SQL
    query. This can be exploited by malicious users to e.g. read sensitive
    data from
    the database through in-band SQL Injection attacks.

  2. User input passed through the “placeholder_fields” parameter to the
    e.g.
    “/Notes/{recordID}/link/history” REST API endpoint is not properly
    sanitized before
    being used to construct a SQL query. This can be exploited by malicious
    users to
    e.g. read sensitive data from the database through in-band SQL Injection
    attacks.

[-] Proof of Concept:

https://karmainsecurity.com/pocs/CVE-2023-35811_1.php
https://karmainsecurity.com/pocs/CVE-2023-35811_2.php

[-] Solution:

Upgrade to version 12.3.0, 12.0.3, 11.0.6, or later.

[-] Disclosure Timeline:

[14/02/2023] - Vendor notified
[12/04/2023] - Fixed versions released
[17/06/2023] - CVE number assigned
[23/08/2023] - Publication of this advisory

[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2023-35811 to these vulnerabilities.

[-] Credits:

Vulnerabilities discovered by Egidio Romano.

[-] Original Advisory:

https://karmainsecurity.com/KIS-2023-08

[-] Other References:

https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/

Related news

CVE-2023-35811: sa-2023-008 - SugarCRM Support Site

An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution