SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. User input is not validated and is written to the filesystem. The ParserLabel::addLabels() function can be used to write attacker-controlled data into the custom language file that will be included at the runtime. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-qrv6-3q86-qv89 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Nov 2024, 20:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
First Time |
Salesagility
Salesagility suitecrm |
|
References | () https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-qrv6-3q86-qv89 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
06 Nov 2024, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Nov 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-05 19:15
Updated : 2024-11-13 20:10
NVD link : CVE-2024-50333
Mitre link : CVE-2024-50333
CVE.ORG link : CVE-2024-50333
JSON object : View
Products Affected
salesagility
- suitecrm
CWE