Security Flaw in SuiteCRM Allows Malicious Code Execution
CVE-2024-49774

7.2HIGH

Key Information:

Vendor
Salesagility
Status
Suitecrm
Vendor
CVE Published:
5 November 2024

Summary

SuiteCRM, a popular open-source Customer Relationship Management software, is affected by a security flaw that allows attackers to bypass security measures designed to prevent the execution of malicious PHP scripts. This vulnerability stems from the improper parsing of PHP scripts using the token_get_all function, which fails to account for certain syntax structures in the Abstract Syntax Tree (AST) that could circumvent blacklist restrictions. Users of SuiteCRM are strongly advised to upgrade to versions 7.14.6 or 8.7.1 or later, as no effective workarounds exist to mitigate this risk. The flaw highlights the critical need for comprehensive security protocols in open-source applications.

Affected Version(s)

SuiteCRM < 7.14.6 < 7.14.6

SuiteCRM >= 8.0.0, < 8.7.1 < 8.0.0, 8.7.1

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.