SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://github.com/mcorybillington/SuiteCRM-RCE | Exploit Third Party Advisory |
https://suitecrm.com/suitecrm-7-11-17-7-10-28-lts-versions-released/ | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-11-06T18:18:05
Updated: 2021-11-17T16:06:11
Reserved: 2020-11-06T00:00:00
Link: CVE-2020-28328
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-11-06T19:15:14.143
Modified: 2021-12-02T19:23:31.560
Link: CVE-2020-28328
JSON object: View
Redhat Information
No data.
CWE