[KIS-2018-05] SugarCRM (SaveDropDown) PHP Code Injection- Vulnerability

From: Egidio Romano <research@karmainsecurity.com>
To: bugtraq@securityfocus.com,fulldisclosure@seclists.org
Subject: [KIS-2018-05] SugarCRM (SaveDropDown) PHP Code Injection- Vulnerability

SugarCRM (SaveDropDown) PHP Code Injection Vulnerability

[-] Software Link:


[-] Affected Versions:

All versions prior to, 8.0.2, and 8.2.0.

[-] Vulnerability Description:

User input passed through key values of the 'list_value' JSON parameter is not properly
sanitized before being used to save PHP code when adding/saving dropdowns through the
Module Builder. This can be exploited to inject and execute arbitrary PHP code.
Successful exploitation of this vulnerability requires admin privileges.

[-] Solution:

Update to versions, 8.0.2, 8.2.0, or later.

[-] Disclosure Timeline:

[03/08/2018] - Vendor notified
[25/09/2018] - Fixed versions released and security advisory published
[31/12/2018] - Publication of this advisory

[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has not assigned a CVE identifier for this vulnerability.

[-] Credits:

Vulnerability discovered by Egidio Romano.

[-] Original Advisory:


[-] Other References:


Copyright © 1995-2021 LinuxRocket.net. All rights reserved.