Vulnerability Description
SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record parameter of the Users module DetailView action that allows authenticated attackers to manipulate database queries. Attackers can append SQL code to the record parameter in GET requests to the index.php endpoint to extract sensitive database information through time-based blind SQL injection techniques.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Salesagility | Suitecrm | <= 7.10.7 |
Related Weaknesses (CWE)
References
- https://suitecrm.com/Product
- https://suitecrm.com/download/Product
- https://www.exploit-db.com/exploits/46311ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/suitecrm-sql-injection-via-record-parameterThird Party Advisory
FAQ
What is CVE-2019-25664?
CVE-2019-25664 is a vulnerability with a CVSS score of 7.1 (HIGH). SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record parameter of the Users module DetailView action that allows authenticated attackers to manipulate database queries. Atta...
How severe is CVE-2019-25664?
CVE-2019-25664 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25664?
Check the references section above for vendor advisories and patch information. Affected products include: Salesagility Suitecrm.