Secunia Security Advisory - Santiago Cortes has reported a vulnerability in Sugar Sales, which can be exploited by malicious people to compromise a vulnerable system.
1db32c7f927e913852adcea84f09740e6d13a2eb4af84b5f706543d6a27d2f5b
TITLE:
Sugar Sales "moduleDefaultFile" File Inclusion Vulnerability
SECUNIA ADVISORY ID:
SA13747
VERIFY ADVISORY:
http://secunia.com/advisories/13747/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
SugarCRM 1.x
http://secunia.com/product/3845/
Sugar Sales (formerly SugarCRM) 2.x
http://secunia.com/product/4314/
DESCRIPTION:
Santiago Cortes has reported a vulnerability in Sugar Sales, which
can be exploited by malicious people to compromise a vulnerable
system.
Input passed to the "moduleDefaultFile" array is not properly
sanitised, before it is used to include files. This can be exploited
to include arbitrary files from external and local resources.
Example:
http://[victim]/index.php?module=Home&moduleDefaultFile[Home]=[file]
Successful exploitation requires that "register_globals" is enabled.
SOLUTION:
Set "register_globals" to "Off".
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
Santiago Cortes
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------