lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 10 Oct 2019 20:37:45 +0200
From: Egidio Romano <research@...mainsecurity.com>
To: fulldisclosure@...lists.org
Subject: [FD] [KIS-2019-05] SugarCRM <= 9.0.1 Multiple Broken Access Control
 Vulnerabilities

----------------------------------------------------------------
SugarCRM <= 9.0.1 Multiple Broken Access Control Vulnerabilities
----------------------------------------------------------------


[-] Software Link:

https://www.sugarcrm.com


[-] Affected Versions:

Version 9.0.1 and prior versions, 8.0.3 and prior versions.


[-] Vulnerabilities Description:

1) There is a Broken Access Control vulnerability with regards to the 
"InboundEmail" module.
When handling the "Save" action the application fails to properly check 
whether the user has
Admin access to the module, thus allowing any user to create a new 
"InboundEmail" bean
regardless of their roles/permissions.

2) There is a Broken Access Control vulnerability with regards to the 
"Trackers" module.
When handling the "trackersettings" action the application fails to 
properly check whether
the user has Admin access to the module, thus allowing any user to 
change Trackers'
settings regardless of their roles/permissions

3) There is a Broken Access Control vulnerability with regards to the 
"Campaigns" module.
When handling the "WizardEmailSetupSave" action the application fails to 
properly check
whether the user has Admin access to the module, thus allowing any user 
to change Email
Setup for Campaigns regardless of their roles/permissions.

4) There is a Broken Access Control vulnerability with regards to the 
"ModuleBuilder" module.
When the "view_module" parameter is set to an empty string, the 
application fails to properly
check whether the user has permissions to access the module, thus 
allowing any user to access
certain ModuleBuilder actions regardless of their roles.

5) There is a Broken Access Control vulnerability with regards to the 
"Administration"
module. When handling the "SaveMerge" action within the "MergeRecords" 
module the application
fails to properly check whether the user is a System Administrator, thus 
allowing unauthorized
users to inject arbitrary "Administration" beans (which means arbitrary 
values into the
"config" database table). Successful exploitation of this vulnerability 
requires an user
account with Developer access to any module.

6) There is a Broken Access Control vulnerability with regards to the 
"Administration" module.
When handling the "Save" action within the "EmailMan" module the 
application allows unauthorized
users to modify administration settings by invoking the 
"Administration::saveConfig()" method.
Successful exploitation of this vulnerability requires an user account 
with Developer access
to the Emails or Campaigns modules.

7) There is a Broken Access Control vulnerability with regards to the 
"Administration" module.
When handling the "WizardEmailSetupSave" action within the "Campaigns" 
module the application
allows unauthorized users to modify administration settings by invoking 
the
"Administration::saveConfig()" method.

8) There is a Local File Inclusion vulnerability within the 
"add_to_prospect_list" function.
User input passed through the "parent_module" and "parent_type" 
parameters is not properly
sanitized before being used in a call to the include() function. This 
can be exploited to
include arbitrary .php files within the webroot and potentially bypass 
authorization mechanisms
(for instance, by setting the "parent_module" parameter to 
"Administration" and the "parent_type"
parameter to "expandDatabase" or any other action which does not 
implement ACL checks).


[-] Solution:

Upgrade to version 9.0.2, 8.0.4, or later.


[-] Disclosure Timeline:

[07/02/2019] - Vendor notified
[01/10/2019] - Versions 9.0.2 and 8.0.4 released
[10/10/2019] - Publication of this advisory


[-] Credits:

Vulnerabilities discovered by Egidio Romano.


[-] Original Advisory:

http://karmainsecurity.com/KIS-2019-05


[-] Other References:

https://support.sugarcrm.com/Documentation/Sugar_Versions/9.0/Ent/Sugar_9.0.2_Release_Notes

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists