Search the Community
Showing results for tags 'sugarcrm'.
-
SugarCRM versions 9.0.1 and below suffer from multiple phar deserialization vulnerabilities. View the full article
-
SugarCRM versions 9.0.1 and below suffer from multiple php object injection vulnerabilities. View the full article
-
SugarCRM versions 9.0.1 and below suffer from multiple PHP code injection vulnerabilities. View the full article
-
SugarCRM versions 9.0.1 and below suffer from multiple path traversal vulnerabilities. View the full article
-
SugarCRM versions 9.0.1 and below suffer from multiple broken access control vulnerabilities. View the full article
-
SugarCRM versions 9.0.1 and below suffer from multiple remote SQL injection vulnerabilities. View the full article
-
SugarCRM versions 9.0.1 and below suffer from multiple reflective cross site scripting vulnerabilities. View the full article
-
SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a path traversal vulnerability. User input passed through the "webhook_target_module" parameter is not properly sanitized before being used to save PHP code into the hooks file through the Web Logic Hooks module. This can be exploited to carry out path traversal attacks and e.g. create arbitrary directories. Successful exploitation of this vulnerability requires admin privileges. View the full article
-
SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through the "trigger_event" parameter is not properly sanitized before being used to save PHP code into the 'logic_hooks.php' file through the Web Logic Hooks module. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article
-
SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'labels_' parameters is not properly sanitized before being used to save PHP code within the "ParserLabel::addLabels()" method when saving labels through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article
-
SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a PHP code injection vulnerability in the WorkFlow module. User input passed through the $_POST['base_module'] parameter to the "Save" action of the WorkFlow module is not properly sanitized before being used to write data into the 'workflow.php' file. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article
-
Exploits SugarCRM SaveDropDown PHP Code Injection
1337day-Exploits posted a topic in Updated Exploits
SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'list_value' JSON parameter is not properly sanitized before being used to save PHP code when adding/saving dropdowns through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges. View the full article-
- sugarcrm
- savedropdown
-
(and 3 more)
Tagged with:
-
SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a remote SQL injection vulnerability. The vulnerability is located within the SOAP API, specifically into the "portal_get_related_notes()" SOAP function. User input passed through the "order_by" parameter is not properly sanitized before being used to construct an "ORDER BY" clause of a SQL query from within the "get_notes_in_contacts()" or "get_notes_in_module()" functions. This can be exploited by Portal API Users to e.g. read sensitive data from the database through time-based SQL injection attacks. View the full article
-
- sugarcrm
- portal_get_related_notes
-
(and 2 more)
Tagged with:
-
SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a server-side request forgery vulnerability. The vulnerability is located within the "ConnectorsController::action_CallRest()" method. User input passed through the "url" request parameter is not properly sanitized before being used in a call to the "file_get_contents" function. View the full article
-
- sugarcrm
- connectorscontroller
-
(and 3 more)
Tagged with:
-
SugarCRM version 6.5.26 suffers from a cross site scripting vulnerability. View the full article