Advertisement






SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion

CVE Category Price Severity
CVE-2020-8803 CWE-284 Unknown High
Author Risk Exploitation Type Date
Unknown High Local 2020-02-13
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020020065

Below is a copy:

SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion
------------------------------------------------------------------------------
SuiteCRM <= 7.11.11 (add_to_prospect_list) Broken Access Control 
Vulnerability
------------------------------------------------------------------------------


[-] Software Link:

https://suitecrm.com/


[-] Affected Versions:

Version 7.11.11 and prior versions.


[-] Vulnerability Description:

There is a Local File Inclusion vulnerability within the 
"add_to_prospect_list" function. User input
passed through the "parent_module" and "parent_type" parameters is not 
properly validated before
being used in a call to the include() function. This can be exploited to 
include arbitrary .php
files within the webroot and potentially bypass authorization mechanisms 
(for instance, by setting
the "parent_module" parameter to "Administration" and the "parent_type" 
parameter to "expandDatabase"
or any other administrative action which does not implement ACL checks).


[-] Solution:

No official solution is currently available.


[-] Disclosure Timeline:

[19/09/2019] - Vendor notified
[20/09/2019] - Vendor acknowledgement
[12/11/2019] - Vendor contacted again asking for updates, no response
[20/01/2020] - Vendor notified about public disclosure intention, no 
response
[07/02/2020] - CVE number assigned
[12/02/2020] - Public disclosure


[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2020-8803 to this vulnerability.


[-] Credits:

Vulnerability discovered by Egidio Romano.


[-] Original Advisory:

http://karmainsecurity.com/KIS-2020-04



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum