exploit the possibilities

SugarCRM 9.0.1 Broken Access Controls

SugarCRM 9.0.1 Broken Access Controls
Posted Oct 11, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions 9.0.1 and below suffer from multiple broken access control vulnerabilities.

tags | exploit, vulnerability
MD5 | 1168050e8aead52cc4050329687aece7

SugarCRM 9.0.1 Broken Access Controls

Change Mirror Download
----------------------------------------------------------------
SugarCRM <= 9.0.1 Multiple Broken Access Control Vulnerabilities
----------------------------------------------------------------


[-] Software Link:

https://www.sugarcrm.com


[-] Affected Versions:

Version 9.0.1 and prior versions, 8.0.3 and prior versions.


[-] Vulnerabilities Description:

1) There is a Broken Access Control vulnerability with regards to the
"InboundEmail" module.
When handling the "Save" action the application fails to properly check
whether the user has
Admin access to the module, thus allowing any user to create a new
"InboundEmail" bean
regardless of their roles/permissions.

2) There is a Broken Access Control vulnerability with regards to the
"Trackers" module.
When handling the "trackersettings" action the application fails to
properly check whether
the user has Admin access to the module, thus allowing any user to
change Trackers'
settings regardless of their roles/permissions

3) There is a Broken Access Control vulnerability with regards to the
"Campaigns" module.
When handling the "WizardEmailSetupSave" action the application fails to
properly check
whether the user has Admin access to the module, thus allowing any user
to change Email
Setup for Campaigns regardless of their roles/permissions.

4) There is a Broken Access Control vulnerability with regards to the
"ModuleBuilder" module.
When the "view_module" parameter is set to an empty string, the
application fails to properly
check whether the user has permissions to access the module, thus
allowing any user to access
certain ModuleBuilder actions regardless of their roles.

5) There is a Broken Access Control vulnerability with regards to the
"Administration"
module. When handling the "SaveMerge" action within the "MergeRecords"
module the application
fails to properly check whether the user is a System Administrator, thus
allowing unauthorized
users to inject arbitrary "Administration" beans (which means arbitrary
values into the
"config" database table). Successful exploitation of this vulnerability
requires an user
account with Developer access to any module.

6) There is a Broken Access Control vulnerability with regards to the
"Administration" module.
When handling the "Save" action within the "EmailMan" module the
application allows unauthorized
users to modify administration settings by invoking the
"Administration::saveConfig()" method.
Successful exploitation of this vulnerability requires an user account
with Developer access
to the Emails or Campaigns modules.

7) There is a Broken Access Control vulnerability with regards to the
"Administration" module.
When handling the "WizardEmailSetupSave" action within the "Campaigns"
module the application
allows unauthorized users to modify administration settings by invoking
the
"Administration::saveConfig()" method.

8) There is a Local File Inclusion vulnerability within the
"add_to_prospect_list" function.
User input passed through the "parent_module" and "parent_type"
parameters is not properly
sanitized before being used in a call to the include() function. This
can be exploited to
include arbitrary .php files within the webroot and potentially bypass
authorization mechanisms
(for instance, by setting the "parent_module" parameter to
"Administration" and the "parent_type"
parameter to "expandDatabase" or any other action which does not
implement ACL checks).


[-] Solution:

Upgrade to version 9.0.2, 8.0.4, or later.


[-] Disclosure Timeline:

[07/02/2019] - Vendor notified
[01/10/2019] - Versions 9.0.2 and 8.0.4 released
[10/10/2019] - Publication of this advisory


[-] Credits:

Vulnerabilities discovered by Egidio Romano.


[-] Original Advisory:

http://karmainsecurity.com/KIS-2019-05


[-] Other References:

https://support.sugarcrm.com/Documentation/Sugar_Versions/9.0/Ent/Sugar_9.0.2_Release_Notes


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    25 Files
  • 17
    Oct 17th
    17 Files
  • 18
    Oct 18th
    7 Files
  • 19
    Oct 19th
    1 Files
  • 20
    Oct 20th
    3 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    11 Files
  • 23
    Oct 23rd
    18 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close