FKIE_CVE-2011-4833

Vulnerability from fkie_nvd - Published: 2011-12-15 03:57 - Updated: 2026-04-29 01:13
Severity ?
Summary
Multiple SQL injection vulnerabilities in the Leads module in SugarCRM 6.1 before 6.1.7, 6.2 before 6.2.4, 6.3 before 6.3.0RC3, and 6.4 before 6.4.0beta1 allow remote attackers to execute arbitrary SQL commands via the (1) where and (2) order parameters in a get_full_list action to index.php.
References
cve@mitre.orghttp://secunia.com/advisories/47011Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1026369Exploit
cve@mitre.orghttp://www.osvdb.org/77459Exploit
cve@mitre.orghttp://www.securityfocus.com/archive/1/520685/100/0/threaded
cve@mitre.orghttp://www.sugarcrm.com/crm/support/bugs.html#issue_47800Exploit
cve@mitre.orghttp://www.sugarcrm.com/crm/support/bugs.html#issue_47805Exploit
cve@mitre.orghttp://www.sugarcrm.com/crm/support/bugs.html#issue_47806Exploit
cve@mitre.orghttp://www.sugarcrm.com/crm/support/bugs.html#issue_47839Exploit
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/71586
cve@mitre.orghttps://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/47011Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1026369Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/77459Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/520685/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.sugarcrm.com/crm/support/bugs.html#issue_47800Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.sugarcrm.com/crm/support/bugs.html#issue_47805Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.sugarcrm.com/crm/support/bugs.html#issue_47806Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.sugarcrm.com/crm/support/bugs.html#issue_47839Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/71586
af854a3a-2127-422b-91ae-364da2661108https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.htmlExploit
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16E5EC2-5F12-4295-A1DC-84D483B41B11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD86E19-E2CF-4A06-9A33-DD225A6014F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E852A2C-DA3A-41AD-A3F5-8E687FF261FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2203D0CE-50B8-4B84-9243-7E9014C4B03B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF1D67F-A948-434D-BF20-C57146E057A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "895944DB-051F-4AF4-822E-FCBB2AC9740C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8FBCC3B-8EBB-4D38-BEF2-633AB22679A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9547CE36-62A8-443D-BB64-52450F73D2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22243D9F-63DD-48F6-AFB0-40E1F0CDC426",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF47CAC-2F55-4599-96D1-6844DBCE249B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0F7430-D811-4063-BF9C-7CCC518C2A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F02CEA83-1236-479C-AAB9-97132A258344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D7CEE2FF-357A-479B-A43A-59C3FBB4682B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sugarcrm:sugarcrm:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "445AB068-5FC6-4E34-9112-3DE3E81EC070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in the Leads module in SugarCRM 6.1 before 6.1.7, 6.2 before 6.2.4, 6.3 before 6.3.0RC3, and 6.4 before 6.4.0beta1 allow remote attackers to execute arbitrary SQL commands via the (1) where and (2) order parameters in a get_full_list action to index.php."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el m\u00f3dulo Leads en SugarCRM v6.1 antes de v6.1.7, v6.2 antes de v6.2.4, v6.3 antes de v6.3.0RC3, y v6.4 antes de v6.4.0beta1, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) where y (2) order, en una acci\u00f3n get_full_list en index.php"
    }
  ],
  "id": "CVE-2011-4833",
  "lastModified": "2026-04-29T01:13:23.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-15T03:57:34.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47011"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1026369"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.osvdb.org/77459"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/520685/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1026369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.osvdb.org/77459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/520685/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…