SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://github.com/mcorybillington/SuiteCRM-RCE | Exploit Third Party Advisory |
https://suitecrm.com/suitecrm-7-11-17-7-10-28-lts-versions-released/ | Release Notes Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-11-06 19:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-28328
Mitre link : CVE-2020-28328
CVE.ORG link : CVE-2020-28328
JSON object : View
Products Affected
salesagility
- suitecrm
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type