First published: Thu Dec 15 2011(Updated: )
Multiple SQL injection vulnerabilities in the Leads module in SugarCRM 6.1 before 6.1.7, 6.2 before 6.2.4, 6.3 before 6.3.0RC3, and 6.4 before 6.4.0beta1 allow remote attackers to execute arbitrary SQL commands via the (1) where and (2) order parameters in a get_full_list action to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SugarCRM | =6.2.3 | |
SugarCRM | =6.2.2 | |
SugarCRM | =6.1.3 | |
SugarCRM | =6.1.4 | |
SugarCRM | =6.1.0 | |
SugarCRM | =6.1.1 | |
SugarCRM | =6.3.0-rc2 | |
SugarCRM | =6.1.2 | |
SugarCRM | =6.2.0 | |
SugarCRM | =6.1.6 | |
SugarCRM | =6.3.0-rc1 | |
SugarCRM | =6.1.5 | |
SugarCRM | =6.4 | |
SugarCRM | =6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4833 allows remote attackers to execute arbitrary SQL commands, potentially compromising the database.
CVE-2011-4833 affects multiple versions of SugarCRM, including 6.1 before 6.1.7 and versions 6.2 before 6.2.4.
To mitigate CVE-2011-4833, it is recommended to upgrade to a patched version of SugarCRM as specified in the vendor's release notes.
The vulnerable versions of SugarCRM include 6.1.0 through 6.1.6 and 6.2.0 through 6.2.3 among others.
CVE-2011-4833 is classified as a high severity vulnerability due to its potential to allow unauthorized database access.