module

SuiteCRM Log File Remote Code Execution

Disclosed
2021-04-28
Created
2021-06-03

Description

This module exploits an input validation error on the log file extension parameter. It does
not properly validate upper/lower case characters. Once this occurs, the application log file
will be treated as a php file. The log file can then be populated with php code by changing the
username of a valid user, as this info is logged. The php code in the file can then be executed
by sending an HTTP request to the log file. A similar issue was reported by the same researcher
where a blank file extension could be supplied and the extension could be provided in the file
name. This exploit will work on those versions as well, and those references are included.

Author

M. Cory Billington

Platform

Linux,Unix

Architectures

ARCH_X64, ARCH_CMD, ARCH_X86

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/suitecrm_log_file_rce
msf exploit(suitecrm_log_file_rce) > show targets
...targets...
msf exploit(suitecrm_log_file_rce) > set TARGET < target-id >
msf exploit(suitecrm_log_file_rce) > show options
...show and set options...
msf exploit(suitecrm_log_file_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.