First published: Sat Jun 17 2023(Updated: )
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Second-Order PHP Object Injection vulnerability has been identified in the DocuSign module. By using crafted requests, custom PHP code can be injected and executed through the DocuSign module because of missing input validation. Admin user privileges are required to exploit this vulnerability. Editions other than Enterprise are also affected.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=11.0.0<11.0.6 | |
Sugarcrm Sugarcrm | >=12.0.0<12.0.3 | |
Sugarcrm Sugarcrm | >=12.0.0<12.0.3 | |
Sugarcrm Sugarcrm | >=12.0.0<12.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-35810.
The severity of CVE-2023-35810 is high with a CVSS score of 7.2.
The affected software by CVE-2023-35810 is SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3.
CVE-2023-35810 is a Second-Order PHP Object Injection vulnerability in the DocuSign module of SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3.
Yes, you can refer to the following links for more information: [Reference 1](http://packetstormsecurity.com/files/174302/SugarCRM-12.2.0-PHP-Object-Injection.html), [Reference 2](http://seclists.org/fulldisclosure/2023/Aug/28), [Reference 3](https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-009/).