SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code.
References
Link | Resource |
---|---|
https://seclists.org/bugtraq/2012/Jun/165 | Mailing List Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2012-0694 | Third Party Advisory |
https://www.exploit-db.com/exploits/19381 | Exploit Third Party Advisory VDB Entry |
https://seclists.org/bugtraq/2012/Jun/165 | Mailing List Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2012-0694 | Third Party Advisory |
https://www.exploit-db.com/exploits/19381 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://seclists.org/bugtraq/2012/Jun/165 - Mailing List, Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2012-0694 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/19381 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-10-29 21:15
Updated : 2024-11-21 01:35
NVD link : CVE-2012-0694
Mitre link : CVE-2012-0694
CVE.ORG link : CVE-2012-0694
JSON object : View
Products Affected
sugarcrm
- sugarcrm
CWE
CWE-20
Improper Input Validation