HTTP: SalesAgility SuiteCRM email_recipients Remote Code Execution

This signature detects attempts to exploit a known vulnerability against SalesAgility SuiteCRM. A successful attack can lead to arbitrary code execution.

Extended Description

SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.

Affected Products

Salesagility suitecrm

Short Name
HTTP:CTS:SALS-AGLTY-EMILRCPT-CE
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2022-23940 Code Execution Remote SalesAgility SuiteCRM email_recipients
Release Date
05/06/2022
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3490
False Positive
Unknown
Vendors

Salesagility

Found a potential security threat?