SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code.
References
| Link | Resource |
|---|---|
| https://seclists.org/bugtraq/2012/Jun/165 | Mailing List Third Party Advisory |
| https://security-tracker.debian.org/tracker/CVE-2012-0694 | Third Party Advisory |
| https://www.exploit-db.com/exploits/19381 | Exploit Third Party Advisory VDB Entry |
| https://seclists.org/bugtraq/2012/Jun/165 | Mailing List Third Party Advisory |
| https://security-tracker.debian.org/tracker/CVE-2012-0694 | Third Party Advisory |
| https://www.exploit-db.com/exploits/19381 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 01:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://seclists.org/bugtraq/2012/Jun/165 - Mailing List, Third Party Advisory | |
| References | () https://security-tracker.debian.org/tracker/CVE-2012-0694 - Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/19381 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-10-29 21:15
Updated : 2024-11-21 01:35
NVD link : CVE-2012-0694
Mitre link : CVE-2012-0694
CVE.ORG link : CVE-2012-0694
JSON object : View
Products Affected
sugarcrm
- sugarcrm
CWE
CWE-20
Improper Input Validation
