[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] [KIS-2019-03] SugarCRM <= 9.0.1 Multiple Reflected Cross-Site Scripting Vulnerabilities
- To: fulldisclosure@xxxxxxxxxxxx
- Subject: [FD] [KIS-2019-03] SugarCRM <= 9.0.1 Multiple Reflected Cross-Site Scripting Vulnerabilities
- From: Egidio Romano <research@xxxxxxxxxxxxxxxxxxx>
- Date: Thu, 10 Oct 2019 20:36:41 +0200
-------------------------------------------------------------------------
SugarCRM <= 9.0.1 Multiple Reflected Cross-Site Scripting
Vulnerabilities
-------------------------------------------------------------------------
[-] Software Link:
https://www.sugarcrm.com
[-] Affected Versions:
Version 9.0.1 and prior versions, 8.0.3 and prior versions.
[-] Vulnerabilities Description:
1) User input passed through the "form" parameter when handling the
"Popup"
action within the "DataSets" module is not properly sanitized before
being
used to generate HTML output. This can be exploited by malicious users
to
carry out Reflected Cross-Site Scripting (XSS) attacks.
2) User input passed through the "name" parameter when handling the
"Popup"
action within the "DataSets" module is not properly sanitized before
being
used to generate HTML output. This can be exploited by malicious users
to
carry out Reflected Cross-Site Scripting (XSS) attacks.
3) User input passed through the "type" parameter when handling the
"dupcheck"
action within the "Import" module is not properly sanitized before being
used
to generate HTML output. This can be exploited by malicious users to
carry
out Reflected Cross-Site Scripting (XSS) attacks.
4) User input passed through the "message" parameter when handling the
"error"
action within the "Import" module is not properly sanitized before being
used
to generate HTML output. This can be exploited by malicious users to
carry
out Reflected Cross-Site Scripting (XSS) attacks.
5) User input passed through the "direct_step" parameter when handling
the
"WizardNewsletter" action within the "Campaigns" module is not properly
sanitized before being used to generate HTML output. This can be
exploited
by malicious users to carry out Reflected Cross-Site Scripting (XSS)
attacks.
6) User input passed through the "iframe_type" parameter when handling
the
"IframeDropdown" action within the "WorkFlow" module is not properly
sanitized before being used to generate HTML output. This can be
exploited
by malicious users to carry out Reflected Cross-Site Scripting (XSS)
attacks.
[-] Solution:
Upgrade to version 9.0.2, 8.0.4, or later.
[-] Disclosure Timeline:
[07/02/2019] - Vendor notified
[01/10/2019] - Versions 9.0.2 and 8.0.4 released
[10/10/2019] - Publication of this advisory
[-] Credits:
Vulnerabilities discovered by Egidio Romano.
[-] Original Advisory:
http://karmainsecurity.com/KIS-2019-03
[-] Other References:
https://support.sugarcrm.com/Documentation/Sugar_Versions/9.0/Ent/Sugar_9.0.2_Release_Notes
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/