exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SugarCRM portal_get_related_notes SQL Injection

SugarCRM portal_get_related_notes SQL Injection
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a remote SQL injection vulnerability. The vulnerability is located within the SOAP API, specifically into the "portal_get_related_notes()" SOAP function. User input passed through the "order_by" parameter is not properly sanitized before being used to construct an "ORDER BY" clause of a SQL query from within the "get_notes_in_contacts()" or "get_notes_in_module()" functions. This can be exploited by Portal API Users to e.g. read sensitive data from the database through time-based SQL injection attacks.

tags | exploit, remote, sql injection
SHA-256 | 8fd642b16f76870fd97e2aa38a1554554e8446dff1fee107a4b11985cc94644a

SugarCRM portal_get_related_notes SQL Injection

Change Mirror Download
---------------------------------------------------------------
SugarCRM (portal_get_related_notes) SQL Injection Vulnerability
---------------------------------------------------------------


[-] Software Link:

http://www.sugarcrm.com


[-] Affected Versions:

All versions prior to 7.9.4.0 and 7.11.0.0.


[-] Vulnerability Description:

The vulnerability is located within the SOAP API, specifically into the
"portal_get_related_notes()" SOAP function. User input passed through the
"order_by" parameter isnat properly sanitized before being used to construct
an "ORDER BY" clause of a SQL query from within the "get_notes_in_contacts()"
or "get_notes_in_module()" functions. This can be exploited by Portal API Users
to e.g. read sensitive data from the database through time-based SQL injection attacks.


[-] Solution:

Update to versions 7.9.4.0, 7.11.0.0, or later.


[-] Disclosure Timeline:

[13/10/2017] - Vendor notified
[28/03/2018] - Fixed versions released and security advisory published
[31/12/2018] - Publication of this advisory


[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has not assigned a CVE identifier for this vulnerability.


[-] Credits:

Vulnerability discovered by Egidio Romano.


[-] Original Advisory:

http://karmainsecurity.com/KIS-2018-03


[-] Other References:

https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2018-003/
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close