what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SugarCRM 9.0.1 Broken Access Controls

SugarCRM 9.0.1 Broken Access Controls
Posted Oct 11, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions 9.0.1 and below suffer from multiple broken access control vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 0dd2fbd4789141e84c8bccb263858c18a97a038f7954176c5e7ff6eb99106ea1

SugarCRM 9.0.1 Broken Access Controls

Change Mirror Download
----------------------------------------------------------------
SugarCRM <= 9.0.1 Multiple Broken Access Control Vulnerabilities
----------------------------------------------------------------


[-] Software Link:

https://www.sugarcrm.com


[-] Affected Versions:

Version 9.0.1 and prior versions, 8.0.3 and prior versions.


[-] Vulnerabilities Description:

1) There is a Broken Access Control vulnerability with regards to the
"InboundEmail" module.
When handling the "Save" action the application fails to properly check
whether the user has
Admin access to the module, thus allowing any user to create a new
"InboundEmail" bean
regardless of their roles/permissions.

2) There is a Broken Access Control vulnerability with regards to the
"Trackers" module.
When handling the "trackersettings" action the application fails to
properly check whether
the user has Admin access to the module, thus allowing any user to
change Trackers'
settings regardless of their roles/permissions

3) There is a Broken Access Control vulnerability with regards to the
"Campaigns" module.
When handling the "WizardEmailSetupSave" action the application fails to
properly check
whether the user has Admin access to the module, thus allowing any user
to change Email
Setup for Campaigns regardless of their roles/permissions.

4) There is a Broken Access Control vulnerability with regards to the
"ModuleBuilder" module.
When the "view_module" parameter is set to an empty string, the
application fails to properly
check whether the user has permissions to access the module, thus
allowing any user to access
certain ModuleBuilder actions regardless of their roles.

5) There is a Broken Access Control vulnerability with regards to the
"Administration"
module. When handling the "SaveMerge" action within the "MergeRecords"
module the application
fails to properly check whether the user is a System Administrator, thus
allowing unauthorized
users to inject arbitrary "Administration" beans (which means arbitrary
values into the
"config" database table). Successful exploitation of this vulnerability
requires an user
account with Developer access to any module.

6) There is a Broken Access Control vulnerability with regards to the
"Administration" module.
When handling the "Save" action within the "EmailMan" module the
application allows unauthorized
users to modify administration settings by invoking the
"Administration::saveConfig()" method.
Successful exploitation of this vulnerability requires an user account
with Developer access
to the Emails or Campaigns modules.

7) There is a Broken Access Control vulnerability with regards to the
"Administration" module.
When handling the "WizardEmailSetupSave" action within the "Campaigns"
module the application
allows unauthorized users to modify administration settings by invoking
the
"Administration::saveConfig()" method.

8) There is a Local File Inclusion vulnerability within the
"add_to_prospect_list" function.
User input passed through the "parent_module" and "parent_type"
parameters is not properly
sanitized before being used in a call to the include() function. This
can be exploited to
include arbitrary .php files within the webroot and potentially bypass
authorization mechanisms
(for instance, by setting the "parent_module" parameter to
"Administration" and the "parent_type"
parameter to "expandDatabase" or any other action which does not
implement ACL checks).


[-] Solution:

Upgrade to version 9.0.2, 8.0.4, or later.


[-] Disclosure Timeline:

[07/02/2019] - Vendor notified
[01/10/2019] - Versions 9.0.2 and 8.0.4 released
[10/10/2019] - Publication of this advisory


[-] Credits:

Vulnerabilities discovered by Egidio Romano.


[-] Original Advisory:

http://karmainsecurity.com/KIS-2019-05


[-] Other References:

https://support.sugarcrm.com/Documentation/Sugar_Versions/9.0/Ent/Sugar_9.0.2_Release_Notes


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close