Vulnerability identifier: #VU21909
Vulnerability risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
SugarCRM
Web applications /
CMS
Vendor: SugarCRM Inc.
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists in the attachment function in the REST API due to input validation error when processing directory traversal sequences. A remote authenticated attacker can send a specially crafted HTTP request and inject arbitrary PHP code on the target system.
Mitigation
Install updates from vendor's website. Install Hot fix applied to 7.9.5.0 for versions 7.9.
Vulnerable software versions
SugarCRM: 7.9.0.0 - 9.0.1
External links
http://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2019-038/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.