Rapid7 Vulnerability & Exploit Database

SuiteCRM Log File Remote Code Execution

Back to Search

SuiteCRM Log File Remote Code Execution

Disclosed
04/28/2021
Created
06/03/2021

Description

This module exploits an input validation error on the log file extension parameter. It does not properly validate upper/lower case characters. Once this occurs, the application log file will be treated as a php file. The log file can then be populated with php code by changing the username of a valid user, as this info is logged. The php code in the file can then be executed by sending an HTTP request to the log file. A similar issue was reported by the same researcher where a blank file extension could be supplied and the extension could be provided in the file name. This exploit will work on those versions as well, and those references are included.

Author(s)

  • M. Cory Billington

Platform

Linux,Unix

Architectures

ARCH_X64, ARCH_CMD, ARCH_X86

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/suitecrm_log_file_rce
msf exploit(suitecrm_log_file_rce) > show targets
    ...targets...
msf exploit(suitecrm_log_file_rce) > set TARGET < target-id >
msf exploit(suitecrm_log_file_rce) > show options
    ...show and set options...
msf exploit(suitecrm_log_file_rce) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;