Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 294804 - SugarCRM Multiple Vulnerabilities
Summary: SugarCRM Multiple Vulnerabilities
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/37464/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-11-27 09:26 UTC by Bernd Marienfeldt
Modified: 2009-11-27 10:23 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Bernd Marienfeldt 2009-11-27 09:26:40 UTC
DESCRIPTION:
Janek Vind has reported some vulnerabilities in SugarCRM, which can
be exploited by malicious users to conduct SQL injection attacks,
bypass certain security restrictions, and compromise a vulnerable
system.

1) Input passed via the "current_query_by_page" parameter to multiple
scripts is not properly sanitised before being used in SQL queries.
This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.

Examples:
http://[host]/index.php?module=Project&action=index&Project2_PROJECT_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Opportunities&action=index&Opportunities2_OPPORTUNITY_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Project&action=index&Project2_PROJECT_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Cases&action=index&Cases2_CASE_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Bugs&action=index&Bugs2_BUG_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Tasks&Tasks2_TASK_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Meetings&action=index&return_module=Meetings&return_action=DetailView&Meetings2_MEETING_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Calls&action=index&return_module=Calls&return_action=DetailView&Calls2_CALL_offset=1&current_query_by_page=[code]
http://[host]/index.php?module=Notes&action=index&return_module=Notes&return_action=DetailView&Notes2_NOTE_offset=1&current_query_by_page=[code]

2) The application does not properly restrict access to the delete
functionality, which can be exploited to delete arbitrary files from
the webroot of the application.

3) Input passed via the "file" parameter to index.php (when
"entryPoint" is set to "HandleAjaxCall" and "method" is set to
"performInstall") is not properly sanitised before being used to
include files. This can be exploited to include arbitrary files from
local and remote resources.

4) The application does not properly restrict access to the Backup
functionality, which can be exploited to create and download backup
files.

5) The application does not properly restrict access to the "Upgrade
Wizard" functionality, which can be exploited to execute arbitrary
PHP code by uploading a PHP file compressed in ZIP format.

6) An error in the .htaccess file when SugarCRM is installed on the
Windows platform can be exploited to access files directly via
uppercase characters.

The vulnerabilities are reported in versions 5.2.0j and 5.5.0.RC2.
Other versions may also be affected

SOLUTION:
Update to version 5.2.0k.

The vulnerabilities are also addressed in version 5.5.0.RC4.

PROVIDED AND/OR DISCOVERED BY:
Janek Vind

ORIGINAL ADVISORY:
http://www.waraxe.us/advisory-76.html
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-11-27 10:23:21 UTC
To my knowledge, we do not have SugarCRM in Portage. It appears to be in an overlay, but these do not get security suport.

I have posted a note in the ebuild request in bug 103295.

Thanks.