First published: Thu Nov 12 2020(Updated: )
An authorization bypass and PHP local-file-include vulnerability in the installation component of SugarCRM before 8.0, 8.0 before 8.0.7, 9.0 before 9.0.4, and 10.0 before 10.0.0 allows for unauthenticated remote code execution against a configured SugarCRM instance via crafted HTTP requests. (This is exploitable even after installation is completed.).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sugarcrm Sugarcrm | >=8.0.0<8.0.7 | |
Sugarcrm Sugarcrm | >=8.0.0<8.0.7 | |
Sugarcrm Sugarcrm | >=8.0.0<8.0.7 | |
Sugarcrm Sugarcrm | >=9.0.0<9.0.4 | |
Sugarcrm Sugarcrm | >=9.0.0<9.0.4 | |
Sugarcrm Sugarcrm | >=9.0.0<9.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7472 is a vulnerability in SugarCRM that allows for unauthenticated remote code execution.
CVE-2020-7472 has a severity rating of 9.8 (Critical).
Versions before 8.0.7, 9.0.4, and 10.0.0 of SugarCRM are affected by CVE-2020-7472.
An attacker can exploit CVE-2020-7472 by sending crafted HTTP requests to a configured SugarCRM instance to bypass authorization and execute remote code.
Yes, patches are available for SugarCRM versions 8.0.7, 9.0.4, and 10.0.0 to address CVE-2020-7472.