SugarCRM Web Logic Hooks Module Path Traversal

Discussion in 'News Aggregator' started by Packet Storm, 3 Jan 2019.

  1. Packet Storm

    Packet Storm Guest

    SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a path traversal vulnerability. User input passed through the "webhook_target_module" parameter is not properly sanitized before being used to save PHP code into the hooks file through the Web Logic Hooks module. This can be exploited to carry out path traversal attacks and e.g. create arbitrary directories. Successful exploitation of this vulnerability requires admin privileges.

    Continue reading...
     

Share This Page

Loading...