CVE-2022-23940
CVSS V2 Medium 6.5
CVSS V3 High 8.8
Description
SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.
Overview
- CVE ID
- CVE-2022-23940
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2022-03-10T17:45:56
- Last Modified Date
- 2022-03-16T17:42:29
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:* | 1 | OR | 7.12.5 | |
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:* | 1 | OR | 8.0 | 8.0.4 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.5
- Severity
- MEDIUM
- Exploitability Score
- 8
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.8
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://docs.suitecrm.com/8.x/admin/releases/8.0/ | Release Notes Vendor Advisory |
https://github.com/manuelz120 | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-23940 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23940 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 15:45:39 | Added to TrackCVE | |||
2022-12-06 11:51:07 | 2022-03-10T17:45Z | 2022-03-10T17:45:56 | CVE Published Date | updated |
2022-12-06 11:51:07 | 2022-03-16T17:42:29 | CVE Modified Date | updated | |
2022-12-06 11:51:07 | Analyzed | Vulnerability Status | updated |