CVE-2024-49773

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Poor input validation in export allows authenticated user do a SQL injection attack. User-controlled input is used to build SQL query. `current_post` parameter in `export` entry point can be abused to perform blind SQL injection via generateSearchWhere(). Allows for Information disclosure, including personally identifiable information. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*

History

13 Nov 2024, 20:29

Type Values Removed Values Added
CWE CWE-89
First Time Salesagility suitecrm
Salesagility
CPE cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
References () https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-5hr4-r43c-6qf7 - () https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-5hr4-r43c-6qf7 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

05 Nov 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-05 19:15

Updated : 2024-11-13 20:29


NVD link : CVE-2024-49773

Mitre link : CVE-2024-49773


JSON object : View

Products Affected

salesagility

  • suitecrm
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')