First published: Tue Nov 05 2024(Updated: )
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. The "Publish Key" field in SuiteCRM's Edit Profile page is vulnerable to Reflected Cross-Site Scripting (XSS), allowing an attacker to inject malicious JavaScript code. This can be exploited to steal CSRF tokens and perform unauthorized actions, such as creating new administrative users without proper authentication. The vulnerability arises due to insufficient input validation and sanitization of the Publish Key field within the SuiteCRM application. When an attacker injects a malicious script, it gets executed within the context of an authenticated user's session. The injected script (o.js) then leverages the captured CSRF token to forge requests that create new administrative users, effectively compromising the integrity and security of the CRM instance. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
SugarCRM | <7.14.6 | |
SugarCRM | >=8.0.0<8.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50335 is classified as a medium severity vulnerability due to its potential to facilitate reflected cross-site scripting attacks.
To fix CVE-2024-50335, update SuiteCRM to version 8.7.2 or later which includes a patch for the vulnerability.
CVE-2024-50335 affects SuiteCRM versions prior to 7.14.6 and versions between 8.0.0 and 8.7.1 inclusive.
CVE-2024-50335 allows attackers to conduct reflected cross-site scripting attacks, potentially compromising user data.
Yes, exploiting CVE-2024-50335 typically requires user interaction as the malicious script needs to be executed in the context of the victim's browser.