CVE-2022-23940

SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.
References
Link Resource
https://docs.suitecrm.com/8.x/admin/releases/8.0/ Release Notes Vendor Advisory
https://github.com/manuelz120 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-03-10 17:45

Updated : 2024-02-28 19:09


NVD link : CVE-2022-23940

Mitre link : CVE-2022-23940

CVE.ORG link : CVE-2022-23940


JSON object : View

Products Affected

salesagility

  • suitecrm
CWE
CWE-502

Deserialization of Untrusted Data