Synology-SA-17:53 SugarCRM
Publish Time: 2017-09-18 16:07:44 UTC+8
Last Updated: 2021-04-14 14:45:02 UTC+8
- Severity
- Important
- Status
- Will not fix
Abstract
Multiple security vulnerabilities have been found in SugarCRM. These vulnerabilities allow remote attackers to cause a SQL injection attack, remote file inclusion attack, and cross-site scripting attack, or may result in the leak of sensitive information from a vulnerable version of SugarCRM.
Severity
- CVE-2017-14508
- Impact: Important
- CVSS3 Base Score: 8.8
- CVSS3 Base Metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- CVE-2017-14509
- Impact: Low
- CVSS3 Base Score: 4.3
- CVSS3 Base Metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- CVE-2017-14510
- Impact: Moderate
- CVSS3 Base Score: 6.1
- CVSS3 Base Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected
- Products
- SugarCRM 6.5.24-0136 and eariler
- Models
- All Synology models
Description
- CVE-2017-14508
An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). Several areas have been identified in the Documents and Emails module that could allow an authenticated user to perform SQL injection, as demonstrated by a backslash character at the end of a bean_id to modules/Emails/DetailView.php. An attacker could exploit these vulnerabilities by sending a crafted SQL request to the affected areas. An exploit could allow the attacker to modify the SQL database. Proper SQL escaping has been added to prevent such exploits. - CVE-2017-14509
An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). A remote file inclusion has been identified in the Connectors module allowing authenticated users to include remotely accessible system files via a module=CallRest&url= query string. Proper input validation has been added to mitigate this issue. - CVE-2017-14510
An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). The WebToLeadCapture functionality is found vulnerable to unauthenticated cross-site scripting (XSS) attacks. This attack vector is mitigated by proper validating the redirect URL values being passed along.
Mitigation
None
Update Availability
None
Reference
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14508
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14509
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14510
- https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-006/
- https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-007/
- https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-008/
- https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/