CRITICALCVE-2024-36412CVSS 10

SuiteCRM unauthenticated SQL Injection

traduzindo…

Plataforma

php

Componente

suitecrm

Corrigido em

7.14.5

8.0.1

AI Confidence: highNVDEPSS 93.6%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2024-36412 describes a SQL Injection vulnerability discovered in SuiteCRM, an open-source CRM application. This flaw resides within the events response entry point, allowing attackers to inject malicious SQL code. Successful exploitation could lead to unauthorized data access and modification. The vulnerability affects SuiteCRM versions 8.0.0 and later, up to, but not including, version 8.6.1. A patch is available in version 8.6.1.

Impacto e Cenários de Ataquetraduzindo…

The SQL Injection vulnerability in SuiteCRM allows an attacker to inject arbitrary SQL queries into the database. This can lead to a wide range of malicious activities, including unauthorized access to sensitive customer data, financial records, and internal system configurations. An attacker could potentially modify or delete data, leading to data integrity issues and operational disruptions. Depending on the database user's privileges, the attacker might even be able to gain control of the underlying database server. The impact is particularly severe given the sensitive nature of data typically stored within CRM systems.

Contexto de Exploraçãotraduzindo…

This vulnerability was publicly disclosed on June 10, 2024. While no active exploitation campaigns have been publicly confirmed, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation. There are currently no known public proof-of-concept exploits, but the vulnerability is likely to be targeted by malicious actors. Monitor security advisories and threat intelligence feeds for updates.

Quem Está em Riscotraduzindo…

Organizations using SuiteCRM versions 8.0.0 through 8.6.0, particularly those handling sensitive customer data or financial information, are at significant risk. Shared hosting environments where multiple customers share the same SuiteCRM instance are also at increased risk, as a vulnerability in one customer's instance could potentially compromise others.

Passos de Detecçãotraduzindo…

• php: Examine SuiteCRM event response code for unsanitized user input. Search for instances where user-supplied data is directly incorporated into SQL queries.

// Example of vulnerable code (DO NOT USE)
$query = "SELECT * FROM users WHERE username = '$username';";

• linux / server: Monitor SuiteCRM application logs for suspicious SQL queries or error messages related to database access. Use journalctl -u suitecrm to review logs. • generic web: Use a web proxy or browser extension to inspect HTTP requests and responses to the SuiteCRM events endpoint. Look for unusual SQL syntax in the request parameters.

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

93.64% (percentil 100%)

CISA SSVC

Exploraçãonone
Automatizávelyes
Impacto Técnicototal

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H10.0CRITICALAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredNoneNível de autenticação necessárioUser InteractionNoneSe a vítima precisa tomar uma açãoScopeChangedImpacto além do componente afetadoConfidentialityHighRisco de exposição de dados sensíveisIntegrityHighRisco de modificação não autorizada de dadosAvailabilityHighRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Nenhum — sem autenticação necessária para explorar.
User Interaction
Nenhuma — ataque automático e silencioso. A vítima não faz nada.
Scope
Alterado — o ataque pode pivotar para além do componente vulnerável.
Confidentiality
Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
Integrity
Alto — o atacante pode escrever, modificar ou excluir qualquer dado.
Availability
Alto — falha completa ou esgotamento de recursos. Negação de serviço total.

Software Afetado

Componentesuitecrm
Fornecedorsalesagility
Faixa afetadaCorrigido em
< 7.14.4 – < 7.14.47.14.5
>= 8.0.0, < 8.6.1 – >= 8.0.0, < 8.6.18.0.1

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2024-36412 is to immediately upgrade SuiteCRM to version 8.6.1 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as input validation and sanitization on the events response entry point. While not a complete solution, this can help reduce the attack surface. Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts can also provide an additional layer of protection. Review and restrict database user permissions to minimize potential damage from successful exploitation.

Como corrigirtraduzindo…

Actualice SuiteCRM a la versión 7.14.4 o superior, o a la versión 8.6.1 o superior. Esto corregirá la vulnerabilidad de inyección SQL. Se recomienda realizar una copia de seguridad antes de actualizar.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2024-36412 — SQL Injection in SuiteCRM?

CVE-2024-36412 is a critical SQL Injection vulnerability affecting SuiteCRM versions 8.0.0 through 8.6.0, allowing attackers to potentially extract or modify data.

Am I affected by CVE-2024-36412 in SuiteCRM?

You are affected if you are running SuiteCRM versions 8.0.0 to 8.6.0. Upgrade to 8.6.1 to resolve the vulnerability.

How do I fix CVE-2024-36412 in SuiteCRM?

Upgrade SuiteCRM to version 8.6.1 or later. As a temporary workaround, implement input validation and sanitization on the events response entry point.

Is CVE-2024-36412 being actively exploited?

While no active exploitation campaigns have been publicly confirmed, the CRITICAL severity suggests a high probability of exploitation.

Where can I find the official SuiteCRM advisory for CVE-2024-36412?

Refer to the official SuiteCRM security advisory for detailed information and updates: [https://suitecrm.com/security/bulletin/cve-2024-36412/](https://suitecrm.com/security/bulletin/cve-2024-36412/)

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.