module

SuiteCRM Log File Remote Code Execution

Disclosed
Apr 28, 2021
Created
Jun 3, 2021

Description

This module exploits an input validation error on the log file extension parameter. It does
not properly validate upper/lower case characters. Once this occurs, the application log file
will be treated as a php file. The log file can then be populated with php code by changing the
username of a valid user, as this info is logged. The php code in the file can then be executed
by sending an HTTP request to the log file. A similar issue was reported by the same researcher
where a blank file extension could be supplied and the extension could be provided in the file
name. This exploit will work on those versions as well, and those references are included.

Author

M. Cory Billington

Platform

Linux,Unix

Architectures

x64, cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/linux/http/suitecrm_log_file_rce
msf exploit(suitecrm_log_file_rce) > show targets
...targets...
msf exploit(suitecrm_log_file_rce) > set TARGET < target-id >
msf exploit(suitecrm_log_file_rce) > show options
...show and set options...
msf exploit(suitecrm_log_file_rce) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.