First published: Mon Jun 22 2009(Updated: )
Unrestricted file upload vulnerability in the Compose Email feature in the Emails module in Sugar Community Edition (aka SugarCRM) before 5.2f allows remote authenticated users to execute arbitrary code by uploading a file with only an extension in its name, then accessing the file via a direct request to a modified filename under cache/modules/Emails/, as demonstrated using .php as the entire original name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SugarCRM | =5.0.0 | |
SugarCRM | =5.1c | |
SugarCRM | =5.1.0 | |
SugarCRM | <=5.2e | |
SugarCRM | =5.2d | |
SugarCRM | =5.1.0-beta | |
SugarCRM | =5.2c | |
SugarCRM | =5.0.0k | |
SugarCRM | =5.0.0h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2146 has a medium severity rating due to its potential for unauthorized code execution.
To fix CVE-2009-2146, upgrade to Sugar Community Edition version 5.2f or later.
CVE-2009-2146 affects all versions of Sugar Community Edition prior to 5.2f.
CVE-2009-2146 is an unrestricted file upload vulnerability in the Compose Email feature.
No, CVE-2009-2146 can only be exploited by authenticated users.