First published: Mon Mar 07 2022(Updated: )
SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SalesAgility SuiteCRM | <7.12.5 | |
SalesAgility SuiteCRM | >=8.0<8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-23940.
The severity of CVE-2022-23940 is high with a severity value of 8.8.
The affected software for CVE-2022-23940 is SuiteCRM through 7.12.1 and 8.x through 8.0.1.
CVE-2022-23940 allows Remote Code Execution by leveraging PHP deserialization in the email_recipients property of the Scheduled Reports module.
Yes, there are references for CVE-2022-23940. You can find them at the following links: [link1](https://docs.suitecrm.com/8.x/admin/releases/8.0/), [link2](https://github.com/manuelz120).