what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SugarCRM 6.1.1 Privilege Restriction Bypass

SugarCRM 6.1.1 Privilege Restriction Bypass
Posted Mar 16, 2011
Site redteam-pentesting.de

SugarCRM versions 6.1.1 and below suffer from a list privilege restriction bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2011-0745
SHA-256 | a294b9e72e838a381dedca4166df412f8e9cceeb2a4d6fe5ffa135e777b8126e

SugarCRM 6.1.1 Privilege Restriction Bypass

Change Mirror Download
Advisory: SugarCRM list privilege restriction bypass

RedTeam Pentesting discovered a vulnerability in SugarCRM that allows
logged in users to bypass restrictions of their list privilege, allowing
to list all entries.


Details
=======

Product: SugarCRM Community Edition
SugarCRM Professional
SugarCRM Enterprise
Affected Versions: <= 6.1.1
Fixed Versions: >= 6.1.3
Vulnerability Type: privilege restriction bypass
Security Risk: medium
Vendor URL: http://www.sugarcrm.com/crm/
Vendor Status: fixed version released
Advisory URL: http://www.redteam-pentesting.de/advisories/rt-sa-2011-002
Advisory Status: published
CVE: CVE-2011-0745
CVE URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0745


Introduction
============

SugarCRM is a customer relation management system written in
PHP. There is a free version, Sugar Community Edition, and two
commercial versions, Sugar Professional and Sugar Enterprise.


More Details
============

SugarCRM supports defining so-called roles, that have a given set of
privileges for each object type, such as customers (called "accounts"),
calls and opportunities. A role can then be assigned to users, to which
the defined privileges apply.

These privileges, among others, include View, Edit, Delete and List. The
List privilege controls to what extent a list of existing objects can be
accessed. It may be set to All, Owner or None. When set to Owner, users
to which this applies can only see the objects they own, such as
customers assigned to them.

When trying to create, for example, a new customer, SugarCRM performs a
duplicate check and warns the user, if a customer using the same name
already exists. The warning page includes a listing of the conflicting
entries, regardless of their owner. Furthermore, when reloading the page
at this point, it shows a complete list of all customers, even if the
user's List privilege is limited to Owner. Directly accessing the URL of
this page works in the same way. This likewise applies to contact
entries, too.


Proof of Concept
================

The following URL displays a list of all customers ("accounts"):
http://www.example.org/sugarcrm/index.php?module=Accounts&action=ShowDuplicates

The following URL displays a list of all contacts:
http://www.example.org/sugarcrm/index.php?module=Contacts&action=ShowDuplicates


Fix
===

Upgrade to SugarCRM 6.1.3.


Security Risk
=============

This vulnerability enables logged-in users to see the names of
customers and contact persons, they are not allowed to see. They however
are not able to otherwise access customer or contact person entries,
such as viewing their details. Thus the risk of this vulnerability is
estimated as medium.

The risk in a particular case varies depending on the actual
confidentiality of customer relationships.


History
=======

2010-09-14 Vulnerability identified
2011-01-28 CVE number requested
2011-02-02 CVE number assigned
2011-02-09 Vendor notified
2011-02-09 Vendor confirmed the vulnerability
2011-03-10 Vendor releases fix
2011-03-15 Advisory released


RedTeam Pentesting GmbH
=======================

RedTeam Pentesting offers individual penetration tests, short pentests,
performed by a team of specialised IT-security experts. Hereby, security
weaknesses in company networks or products are uncovered and can be
fixed immediately.

As there are only few experts in this field, RedTeam Pentesting wants to
share its knowledge and enhance the public knowledge with research in
security related areas. The results are made available as public
security advisories.

More information about RedTeam Pentesting can be found at
http://www.redteam-pentesting.de.


--
RedTeam Pentesting GmbH Tel.: +49 241 963-1300
Dennewartstr. 25-27 Fax : +49 241 963-1304
52068 Aachen http://www.redteam-pentesting.de/
Germany Registergericht: Aachen HRB 14004
Geschäftsführer: Patrick Hof, Jens Liebchen, Claus R. F. Overbeck
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close