#VU21910 Path traversal in SugarCRM


Published: 2019-10-17

Vulnerability identifier: #VU21910

Vulnerability risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-17312

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SugarCRM
Web applications / CMS

Vendor: SugarCRM Inc.

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists in the file function in the REST APIdue to input validation error when processing directory traversal sequences. A remote authenticated attacker can send a specially crafted HTTP request and inject arbitrary PHP code on the target system.

Mitigation
Install updates from vendor's website. Install Hot fix applied to 7.9.5.0 for versions 7.9.

Vulnerable software versions

SugarCRM: 7.9.0.0 - 9.0.1


External links
http://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2019-039/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability