Vulnerability Details : CVE-2021-42840
Public exploit exists!
SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blocked. NOTE: this issue exists because of an incomplete fix for CVE-2020-28328.
Vulnerability category: Execute code
Products affected by CVE-2021-42840
- cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-42840
47.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2021-42840
-
SuiteCRM Log File Remote Code Execution
Disclosure Date: 2021-04-28First seen: 2021-06-03exploit/linux/http/suitecrm_log_file_rceThis module exploits an input validation error on the log file extension parameter. It does not properly validate upper/lower case characters. Once this occurs, the application log file will be treated as a php file. The log file can then be populated with php code by
CVSS scores for CVE-2021-42840
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2021-42840
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-42840
-
https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19
7.11.x Releases :: SuiteCRM DocumentationRelease Notes;Vendor Advisory
-
https://github.com/rapid7/metasploit-framework/commits/master/modules/exploits/linux/http/suitecrm_log_file_rce.rb
History for modules/exploits/linux/http/suitecrm_log_file_rce.rb - rapid7/metasploit-framework · GitHubThird Party Advisory
-
https://suitecrm.com/time-to-upgrade-suitecrm-7-11-19-7-10-30-lts-released/
Time to upgrade: SuiteCRM 7.11.19 & 7.10.30 LTS Released! - SuiteCRMRelease Notes;Vendor Advisory
-
http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html
SuiteCRM 7.11.18 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://theyhack.me/SuiteCRM-RCE-2/
SuiteCRM RCE Log File Extension Bypass 2 - theyhack.meExploit;Third Party Advisory
Jump to