CVE-2017-14508
https://notcve.org/view.php?id=CVE-2017-14508
An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). Several areas have been identified in the Documents and Emails module that could allow an authenticated user to perform SQL injection, as demonstrated by a backslash character at the end of a bean_id to modules/Emails/DetailView.php. An attacker could exploit these vulnerabilities by sending a crafted SQL request to the affected areas. An exploit could allow the attacker to modify the SQL database. Proper SQL escaping has been added to prevent such exploits. • https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-006 https://www.synology.com/support/security/Synology_SA_17_53_SugarCRM • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2012-0694 – SugarCRM CE 6.3.1 - 'Unserialize()' PHP Code Execution
https://notcve.org/view.php?id=CVE-2012-0694
SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code. SugarCRM CE versiones anteriores a 6.3.1 incluyéndola, contiene scripts que usan la función "unserialize()" con entrada controlada por el usuario lo que permite a atacantes remotos ejecutar código PHP arbitrario. SugarCRM CE versions 6.3.1 and below suffer from an unserialize() PHP code execution vulnerability. • https://www.exploit-db.com/exploits/19403 https://www.exploit-db.com/exploits/19381 https://seclists.org/bugtraq/2012/Jun/165 https://security-tracker.debian.org/tracker/CVE-2012-0694 • CWE-20: Improper Input Validation •
CVE-2011-0745 – SugarCRM 6.1.1 - Information Disclosure
https://notcve.org/view.php?id=CVE-2011-0745
SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php. SugarCRM en versiones anteriores a la 6.1.3 no maneja apropiadamente las recargas y peticiones directas de una página de advertencia producida por una comprobación de duplicidad ("check duplicate") determinada, lo que permite a usuarios autenticados remotos averiguar (1) los nombres de clientes a través una acción ShowDuplicates del módulo Accounts, a la que se puede acceder través de index.php; o (2) los nombres de personas de contacto a través de una acción ShowDuplicates del módulo Contacts, a la que se puede acceder través de index.php. SugarCRM versions 6.1.1 and below suffer from a list privilege restriction bypass vulnerability. • https://www.exploit-db.com/exploits/35467 http://securityreason.com/securityalert/8141 http://www.redteam-pentesting.de/advisories/rt-sa-2011-002 http://www.securityfocus.com/archive/1/517027/100/0/threaded http://www.securityfocus.com/bid/46885 http://www.securitytracker.com/id?1025222 http://www.vupen.com/english/advisories/2011/0675 https://exchange.xforce.ibmcloud.com/vulnerabilities/66110 • CWE-20: Improper Input Validation •
CVE-2009-2978
https://notcve.org/view.php?id=CVE-2009-2978
SQL injection vulnerability in SugarCRM 4.5.1o and earlier, 5.0.0k and earlier, and 5.2.0g and earlier, allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en SugarCRM v4.5.1o y anteriores, v5.0.0k y anteriores, y v5.2.0g y anteriores, permite a los atacantes remotos ejecutar arbitrariamente comandos SQL a través de vectores no especificados. • http://jvn.jp/en/jp/JVN31035930/index.html http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000056.html http://secunia.com/advisories/36423 http://www.ipa.go.jp/security/vuln/documents/2009/200908_sugarcrm.html http://www.securityfocus.com/bid/36118 http://www.sugarcrm.com/forums/showthread.php?t=50907 http://www.sugarcrm.com/forums/showthread.php?t=50953 https://exchange.xforce.ibmcloud.com/vulnerabilities/52679 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2009-2146 – SugarCRM 5.2.0e - Remote Code Execution
https://notcve.org/view.php?id=CVE-2009-2146
Unrestricted file upload vulnerability in the Compose Email feature in the Emails module in Sugar Community Edition (aka SugarCRM) before 5.2f allows remote authenticated users to execute arbitrary code by uploading a file with only an extension in its name, then accessing the file via a direct request to a modified filename under cache/modules/Emails/, as demonstrated using .php as the entire original name. Vulnerabilidad de subida de fichero sin restricción en la caracteristica Compose Email del módulo Emails in Sugar Community Edition (también conocido como SugarCRM) versión anterior a 5.2f permite a atacantes remotos ejecutar código de su elección subiendo un fichero con una extensión ejecutable, posteriormente accediendo al fichero mediante una petición directa a un fichero modificado del directorio cache/modules/Emails/, como se ha demostrado al usar .php como el nombre completo original • https://www.exploit-db.com/exploits/8949 http://secunia.com/advisories/35445 http://www.securityfocus.com/bid/35361 http://www.sugarforge.org/frs/download.php/5598/Sugar_CommunityEdition_ReleaseNotes_5.2f.pdf http://www.ush.it/team/ush/hack-sugarcrm_520e/adv.txt •