SuiteCRM up to 7.10.34/7.12.1 ZIP Archive UpgradeWizard cross-site request forgery

A vulnerability was found in SuiteCRM up to 7.10.34/7.12.1. It has been classified as problematic. Affected is the function UpgradeWizard of the component ZIP Archive Handler. Upgrading to version 7.10.35 or 7.12.2 eliminates this vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

122
018

Field

source_cve_nvd_summary1
exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1

Commit Conf

90%29
50%10
70%1

Approve Conf

90%29
80%10
70%1
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1205017001/15/2022VulD...cve_nvd_summarySuiteCRM through 7.11.21 is vulnerable to CSRF, with resultant remote code execution, via the UpgradeWizard functionality, if a PHP file is included in a ZIP archive.cve.mitre.org01/15/2022accepted
70
1203778401/13/2022VulD...price_0day$0-$5ksee exploit price documentation01/13/2022accepted
90
1203778301/13/2022VulD...cvss3_meta_tempscore4.1see CVSS documentation01/13/2022accepted
90
1203778201/13/2022VulD...cvss3_meta_basescore4.3see CVSS documentation01/13/2022accepted
90
1203778101/13/2022VulD...cvss3_vuldb_tempscore4.1see CVSS documentation01/13/2022accepted
90
1203778001/13/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation01/13/2022accepted
90
1203777901/13/2022VulD...cvss2_vuldb_tempscore4.4see CVSS documentation01/13/2022accepted
90
1203777801/13/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation01/13/2022accepted
90
1203777701/13/2022VulD...cvss3_vuldb_eXderived from historical data01/13/2022accepted
80
1203777601/13/2022VulD...cvss2_vuldb_eNDderived from historical data01/13/2022accepted
80
1203777501/13/2022VulD...cvss2_vuldb_rlOFderived from vuldb v3 vector01/13/2022accepted
80
1203777401/13/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector01/13/2022accepted
80
1203777301/13/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector01/13/2022accepted
80
1203777201/13/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector01/13/2022accepted
80
1203777101/13/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector01/13/2022accepted
80
1203777001/13/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector01/13/2022accepted
80
1203776901/13/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector01/13/2022accepted
80
1203776801/13/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector01/13/2022accepted
80
1203776701/13/2022VulD...date1642028400 (01/13/2022)01/13/2022accepted
90
1203776601/13/2022VulD...cve_assigned1632434400cve.org01/13/2022accepted
90

20 more entries are not shown

Do you want to use VulDB in your project?

Use the official API to access entries easily!