Skip to content

Authenticated SQL Injection in EmailUIAjax displayView controller

Critical
jack7anderson7 published GHSA-9rvr-mcrf-p4p7 Jun 10, 2024

Package

SuiteCRM

Affected versions

<= 7.14.3
<= 8.6.0

Patched versions

7.14.4
8.6.1

Description

Impact

What kind of vulnerability is it? Who is impacted?
Poor input validation allows for SQL Injection in EmailUIAjax displayView controller.

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

References

Are there any links users can visit to find out more?

SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.

Severity

Critical
9.6
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H

CVE ID

CVE-2024-36411

Weaknesses

Credits