Share
## https://sploitus.com/exploit?id=1337DAY-ID-39004
----------------------------------------------------
SugarCRM <= 12.2.0 Two SQL Injection Vulnerabilities
----------------------------------------------------


[-] Software Link:

https://www.sugarcrm.com


[-] Affected Versions:

Version 12.2.0 and prior versions.
Version 12.0.2 and prior versions.
Version 11.0.5 and prior versions.


[-] Vulnerabilities Description:

1) User input passed through the “metrics” parameter to the 
“/Forecasts/metrics”
REST API endpoint is not properly sanitized before being used to 
construct a SQL
query. This can be exploited by malicious users to e.g. read sensitive 
data from
the database through in-band SQL Injection attacks.

2) User input passed through the “placeholder_fields” parameter to the 
e.g.
“/Notes/{recordID}/link/history” REST API endpoint is not properly 
sanitized before
being used to construct a SQL query. This can be exploited by malicious 
users to
e.g. read sensitive data from the database through in-band SQL Injection 
attacks.


[-] Proof of Concept:

https://karmainsecurity.com/pocs/CVE-2023-35811_1.php
https://karmainsecurity.com/pocs/CVE-2023-35811_2.php


[-] Solution:

Upgrade to version 12.3.0, 12.0.3, 11.0.6, or later.


[-] Disclosure Timeline:

[14/02/2023] - Vendor notified
[12/04/2023] - Fixed versions released
[17/06/2023] - CVE number assigned
[23/08/2023] - Publication of this advisory


[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2023-35811 to these vulnerabilities.


[-] Credits:

Vulnerabilities discovered by Egidio Romano.


[-] Original Advisory:

https://karmainsecurity.com/KIS-2023-08


[-] Other References:

https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/