First published: Tue Nov 05 2024(Updated: )
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. User input is not validated and is written to the filesystem. The ParserLabel::addLabels() function can be used to write attacker-controlled data into the custom language file that will be included at the runtime. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
SugarCRM | <7.14.6 | |
SugarCRM | >=8.0.0<8.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50333 has been assigned a high severity rating due to the potential for user input exploitation and filesystem manipulation.
To mitigate CVE-2024-50333, ensure input validation is implemented in the ParserLabel::addLabels() function and update to SuiteCRM version 8.7.1 or later.
CVE-2024-50333 affects SuiteCRM versions prior to 7.14.6 and versions between 8.0.0 and 8.7.1.
CVE-2024-50333 allows an attacker to write arbitrary data to the filesystem, potentially leading to file inclusion or data theft.
Yes, updating SuiteCRM to version 8.7.1 or higher addresses the vulnerability associated with CVE-2024-50333.