First published: Sat Jun 17 2023(Updated: )
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=12.0.0<12.0.3 | |
Sugarcrm Sugarcrm | >=12.0.0<12.0.3 | |
Sugarcrm Sugarcrm | >=12.0.0<12.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35809 is a Bean Manipulation vulnerability in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3.
CVE-2023-35809 has a severity rating of 8.8 (high).
CVE-2023-35809 allows an attacker to inject custom PHP code through the REST API in SugarCRM.
To fix CVE-2023-35809, you should upgrade to SugarCRM Enterprise 11.0.6 or 12.0.3.
More information about CVE-2023-35809 can be found in the following references: [link1], [link2], [link3].