Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-23940

Опубликовано: 10 мар. 2022
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Средний

Описание

SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
Версия до 7.12.5 (исключая)
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
Версия от 8.0 (включая) до 8.0.4 (исключая)

EPSS

Процентиль: 97%
0.35871
Средний

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.8
github
почти 4 года назад

SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.

EPSS

Процентиль: 97%
0.35871
Средний

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502