An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). Several areas have been identified in the Documents and Emails module that could allow an authenticated user to perform SQL injection, as demonstrated by a backslash character at the end of a bean_id to modules/Emails/DetailView.php. An attacker could exploit these vulnerabilities by sending a crafted SQL request to the affected areas. An exploit could allow the attacker to modify the SQL database. Proper SQL escaping has been added to prevent such exploits.
References
Link | Resource |
---|---|
https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-006/ | Vendor Advisory |
https://www.synology.com/support/security/Synology_SA_17_53_SugarCRM |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-09-17T21:00:00
Updated: 2017-12-29T13:57:02
Reserved: 2017-09-17T00:00:00
Link: CVE-2017-14508
JSON object: View
NVD Information
Status : Modified
Published: 2017-09-17T21:29:00.217
Modified: 2017-12-30T02:29:01.860
Link: CVE-2017-14508
JSON object: View
Redhat Information
No data.
CWE