Vulnerability Description
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sugarcrm | Sugarcrm | >= 11.0.0, < 11.0.6 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html
- http://seclists.org/fulldisclosure/2023/Aug/29
- https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/Vendor Advisory
- http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html
- http://seclists.org/fulldisclosure/2023/Aug/29
- https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/Vendor Advisory
FAQ
What is CVE-2023-35811?
CVE-2023-35811 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be i...
How severe is CVE-2023-35811?
CVE-2023-35811 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-35811?
Check the references section above for vendor advisories and patch information. Affected products include: Sugarcrm Sugarcrm.