SugarCRM list privilege restriction bypass

2011.03.18
Risk: Low
Local: No
Remote: Yes
CWE: CWE-20


CVSS Base Score: 4/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Advisory: SugarCRM list privilege restriction bypass RedTeam Pentesting discovered a vulnerability in SugarCRM that allows logged in users to bypass restrictions of their list privilege, allowing to list all entries. Details ======= Product: SugarCRM Community Edition SugarCRM Professional SugarCRM Enterprise Affected Versions: <= 6.1.1 Fixed Versions: >= 6.1.3 Vulnerability Type: privilege restriction bypass Security Risk: medium Vendor URL: http://www.sugarcrm.com/crm/ Vendor Status: fixed version released Advisory URL: http://www.redteam-pentesting.de/advisories/rt-sa-2011-002 Advisory Status: published CVE: CVE-2011-0745 CVE URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0745 Introduction ============ SugarCRM is a customer relation management system written in PHP. There is a free version, Sugar Community Edition, and two commercial versions, Sugar Professional and Sugar Enterprise. More Details ============ SugarCRM supports defining so-called roles, that have a given set of privileges for each object type, such as customers (called "accounts"), calls and opportunities. A role can then be assigned to users, to which the defined privileges apply. These privileges, among others, include View, Edit, Delete and List. The List privilege controls to what extent a list of existing objects can be accessed. It may be set to All, Owner or None. When set to Owner, users to which this applies can only see the objects they own, such as customers assigned to them. When trying to create, for example, a new customer, SugarCRM performs a duplicate check and warns the user, if a customer using the same name already exists. The warning page includes a listing of the conflicting entries, regardless of their owner. Furthermore, when reloading the page at this point, it shows a complete list of all customers, even if the user's List privilege is limited to Owner. Directly accessing the URL of this page works in the same way. This likewise applies to contact entries, too. Proof of Concept ================ The following URL displays a list of all customers ("accounts"): http://www.example.org/sugarcrm/index.php?module=Accounts&action=ShowDup licates The following URL displays a list of all contacts: http://www.example.org/sugarcrm/index.php?module=Contacts&action=ShowDup licates Fix === Upgrade to SugarCRM 6.1.3. Security Risk ============= This vulnerability enables logged-in users to see the names of customers and contact persons, they are not allowed to see. They however are not able to otherwise access customer or contact person entries, such as viewing their details. Thus the risk of this vulnerability is estimated as medium. The risk in a particular case varies depending on the actual confidentiality of customer relationships. History ======= 2010-09-14 Vulnerability identified 2011-01-28 CVE number requested 2011-02-02 CVE number assigned 2011-02-09 Vendor notified 2011-02-09 Vendor confirmed the vulnerability 2011-03-10 Vendor releases fix 2011-03-15 Advisory released RedTeam Pentesting GmbH ======================= RedTeam Pentesting offers individual penetration tests, short pentests, performed by a team of specialised IT-security experts. Hereby, security weaknesses in company networks or products are uncovered and can be fixed immediately. As there are only few experts in this field, RedTeam Pentesting wants to share its knowledge and enhance the public knowledge with research in security related areas. The results are made available as public security advisories. More information about RedTeam Pentesting can be found at http://www.redteam-pentesting.de. -- RedTeam Pentesting GmbH Tel.: +49 241 963-1300 Dennewartstr. 25-27 Fax : +49 241 963-1304 52068 Aachen http://www.redteam-pentesting.de/ Germany Registergericht: Aachen HRB 14004 Geschftsfhrer: Patrick Hof, Jens Liebchen, Claus R. F. Overbeck -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAABAgAGBQJNf5OWAAoJENG/HXWsgFSuv3IIALRDSQSBhW0L/+ZAjMRTXLN/ HcU0KSxtj3JE4GNyaAG4jb877GGR3eKAQ6Urz/xj9hKcSeatK6nZNq7JXdVMGahJ fjZLRC9uBSQJrAft0PWsnFkAG7xTnaH/Ug4rJ6R7NVFI09M6Da3SrIVI9wk5e4kS 57u/CNPYfQKOMGxg/CwJksMUWvFq58hzVCRxwFQNS1qUzp0g1pM0OhQLKx5SSl7N iR77hpiJdWxtSRv3UpyGMLt6rJ9jEDrOgej7tuowzLMTyvu3eNERdyAqbTdWJxYb wcRzg8E2C9gghE9a5lRM77jFeyEeauoKgNNXRSwqMnOH9cjOIb1+RBkwKFGWwtE= =vTSw -----END PGP SIGNATURE-----

References:

http://www.securityfocus.com/archive/1/archive/1/517027/100/0/threaded
http://www.redteam-pentesting.de/advisories/rt-sa-2011-002


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top