Security
Headlines
HeadlinesLatestCVEs

Headline

SugarCRM 12.2.0 Shell Upload

SugarCRM versions 12.2.0 and below suffers from a multiple step remote shell upload vulnerability.

Packet Storm
#vulnerability#php
-----------------------------------------------------------------SugarCRM <= 12.2.0 (Notes) Unrestricted File Upload Vulnerability-----------------------------------------------------------------[-] Software Link:https://www.sugarcrm.com[-] Affected Versions:Version 12.2.0 and prior versions.Version 12.0.2 and prior versions.Version 11.0.5 and prior versions.[-] Vulnerability Description:When handling the "save" action within the "Notes" module the application allows uploadingof any kind of file into the /upload/ directory. This one is protected by the main SugarCRM.htaccess file, i.e. it doesn't allow access/execution for PHP files. However, this behaviourcan be overridden if a subdirectory contains another .htaccess file. So, an attacker canleverage the vulnerability to firstly upload a new .htaccess file and then to upload thePHP code they want to execute.[-] Proof of Concept:https://karmainsecurity.com/pocs/CVE-2023-35808.php[-] Solution:Upgrade to version 12.3.0, 12.0.3, 11.0.6, or later.[-] Disclosure Timeline:[14/02/2023] - Vendor notified[12/04/2023] - Fixed versions released[17/06/2023] - CVE number assigned[23/08/2023] - Publication of this advisory[-] CVE Reference:The Common Vulnerabilities and Exposures project (cve.mitre.org)has assigned the name CVE-2023-35808 to this vulnerability.[-] Credits:Vulnerability discovered by Egidio Romano.[-] Original Advisory:http://karmainsecurity.com/KIS-2023-05[-] Other References:https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-006/

Related news

CVE-2023-35808: sa-2023-006 - SugarCRM Support Site

An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. An Unrestricted File Upload vulnerability has been identified in the Notes module. By using crafted requests, custom PHP code can be injected and executed through the Notes module because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected.

Packet Storm: Latest News

ABB Cylon Aspect 3.07.02 user.properties Default Credentials