CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-36412

Critical Severity
Salesagility
SVRS
84/100

CVSSv3
9.8/10

EPSS
0.92752/1

CVE-2024-36412: SQL Injection vulnerability in SuiteCRM. This flaw allows attackers to inject malicious SQL code via the events response entry point, potentially leading to data breaches and system compromise. SuiteCRM versions before 7.14.4 and 8.6.1 are affected.

With a SOCRadar Vulnerability Risk Score (SVRS) of 84, CVE-2024-36412 is classified as a critical vulnerability, demanding immediate attention and patching. The high SVRS indicates that this vulnerability is actively being exploited in the wild and poses a significant risk. Successful exploitation could result in unauthorized access to sensitive customer data, modification of critical system settings, or complete system takeover. Upgrade to SuiteCRM version 7.14.4 or 8.6.1 to mitigate the risk. The SQL injection vulnerability arises from improper sanitization of user inputs, allowing malicious SQL commands to be executed within the application's database queries.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-06-10

2024-06-12
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-36412 is a SQL injection vulnerability in SuiteCRM, an open-source CRM software. This vulnerability allows attackers to execute arbitrary SQL queries on the vulnerable system, potentially leading to data theft, unauthorized access, or system compromise. The CVSS score of 10 indicates the critical severity of this vulnerability, while the SVRS of 38 highlights the moderate risk associated with it.

Key Insights

  • Exploitation: Active exploits have been published for this vulnerability, indicating that attackers are actively targeting it.
  • Threat Actors: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: There is no evidence that this vulnerability is being actively exploited in the wild.

Mitigation Strategies

  • Update SuiteCRM: Update SuiteCRM to version 7.14.4 or 8.6.1, which contain a fix for this vulnerability.
  • Implement Input Validation: Implement strict input validation on all user-supplied data to prevent SQL injection attacks.
  • Use a Web Application Firewall (WAF): Deploy a WAF to block malicious traffic and protect against SQL injection attacks.
  • Monitor for Suspicious Activity: Monitor logs and network traffic for any suspicious activity that may indicate an SQL injection attack.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Threat Landscape Report: The PSTS Sector’s Unique Vulnerabilities
ReliaQuest Threat Research Team2024-09-19
Threat Landscape Report: The PSTS Sector’s Unique Vulnerabilities | Stay ahead of cyber threats in the PSTS sector with ReliaQuest's latest insights. Download the report for detailed analysis and expert strategies.Sector Overview The professional, scientific, and technical services (PSTS) sector—ReliaQuest’s second-largest client segment—recorded an above-average rate of true-positive GreyMatter alerts at 2.9%. The PSTS sector, with its large stores of sensitive data, extensive client network, and vulnerability to trust-eroding breaches
digitalshadows.com
rss
forum
news
CVE-2024-36412 | SalesAgility SuiteCRM up to 7.14.3/8.6.0 Events Response Entry Point sql injection
vuldb.com2024-06-10
CVE-2024-36412 | SalesAgility SuiteCRM up to 7.14.3/8.6.0 Events Response Entry Point sql injection | A vulnerability, which was classified as critical, has been found in SalesAgility SuiteCRM up to 7.14.3/8.6.0. Affected by this issue is some unknown functionality of the component Events Response Entry Point. The manipulation leads to sql injection. This vulnerability is handled as CVE-2024-36412. The attack may
cve-2024-36412
domains
urls
cves

Social Media

⚠️ Critical SQL Injection Vulnerability in SuiteCRM (CVE-2024-36412) 🚨 Older versions of SuiteCRM are affected, with potential for unauthorized database manipulation. Stay informed, stay protected 💡 https://t.co/jBCasPJgFZ #SonicWall #CVE202436412 #SQL #vulnerability https://t.co/PjTtbxBgIp
0
0
1
CVE-2024-36412 (CVSS:9.8, CRITICAL) is Analyzed. SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6..https://t.co/FIs0xXGejW #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0
CVE-2024-36412 SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry p… https://t.co/UriJBvCxm8
0
0
0
[CVE-2024-36412: 10/CRITICAL] Vulnerability in SuiteCRM versions 7.14.4 & 8.6.1 allows SQL injection attack via events response entry point. Upgrade to secure your CRM system. https://t.co/s8ALAgFH3i
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppSalesagilitysuitecrm

References

ReferenceLink
[email protected]https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-xjx2-38hv-5hh8

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence