Improper Authorization in salesagility/suitecrm
Reported on
Feb 14th 2022
Description
In SuiteCRM v7.12.4, affecting Employee Module, any user with the User Type as Regular User could export employee records via /index.php?entryPoint=export
endpoint. The prerequisite of this attack is by knowing the user record (ID) which can be obtained in the employees' section. The impact could lead to employee record information exposure such as User Name, Full Name, ID, Full Address, Phone Number and others.
Proof of Concept
Affected Endpoint:
1 POST http://{HOST}/index.php?entryPoint=export
~
Request file , pwd: xBCwVicbq9
Impact
This vulnerability is capable of leading to unauthorized sensitive information disclosure of relevant parties such as User Name, ID and others that can be used to orchestrate the further attack.
Hi Faisal,
Thank you for your Security Report(s).
We have raised this issue with our internal security team to be confirmed.
Below is a reference of the issue raised and ID allocated.
SCRMBT-#190 - Improper Authorisation in Employees
We will review the issue and confirm if it is a vulnerability within SuiteCRM and meets our criteria for a Security issue. If an issue is not considered a Security issue or that it does not need to be private then we'll raise it via the GitHub bug tracker or a more appropriate place.
Thank you for your contribution to the SuiteCRM project.
Hi Faisal,
The Security Team have now assessed the following issue:
- SCRMBT-#190 - Improper Authorisation in Employees
This issue has been given a severity grading of 'Moderate'. We will look to release a fix for this issue in the near future.
Once the fix is released, we aim to include your name in the release notes - giving credit for finding and reporting this issue. Please let us know if you would prefer not be included or have a specific request on how you would like to be referenced within the release notes.
Thank you for your assistance and contribution to the SuiteCRM product!
Great, thanks for the update. Btw, you can use the name in the release notes as
Faisal Fs with @faisalfs10x as handle, and company name NetbyteSEC, www.netbytesec.com.