Vulnerability Details : CVE-2012-0694
Public exploit exists!
SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code.
Vulnerability category: Input validation
Products affected by CVE-2012-0694
- cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:community:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-0694
93.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-0694
-
SugarCRM unserialize() PHP Code Execution
Disclosure Date: 2012-06-23First seen: 2020-04-26exploit/unix/webapp/sugarcrm_unserialize_execThis module exploits a php unserialize() vulnerability in SugarCRM <= 6.3.1 which could be abused to allow authenticated SugarCRM users to execute arbitrary code with the permissions of the webserver. The dangerous unserialize() exists in the 'include/MVC/Vi
CVSS scores for CVE-2012-0694
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2012-0694
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0694
-
https://seclists.org/bugtraq/2012/Jun/165
Bugtraq: [CVE-2012-0694] SugarCRM CE <= 6.3.1 "unserialize()" PHP Code ExecutionMailing List;Third Party Advisory
-
https://security-tracker.debian.org/tracker/CVE-2012-0694
CVE-2012-0694Third Party Advisory
-
https://www.exploit-db.com/exploits/19381
SugarCRM CE 6.3.1 - 'Unserialize()' PHP Code Execution - PHP webapps ExploitExploit;Third Party Advisory;VDB Entry
Jump to