{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-35809","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-12-17T16:28:37.652Z","dateReserved":"2023-06-17T00:00:00.000Z","datePublished":"2023-06-17T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-08-23T15:06:15.726Z"},"descriptions":[{"lang":"en","value":"An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-007/"},{"name":"20230823 [KIS-2023-06] SugarCRM <= 12.2.0 (updateGeocodeStatus) Bean Manipulation Vulnerability","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2023/Aug/27"},{"url":"http://packetstormsecurity.com/files/174301/SugarCRM-12.2.0-Bean-Manipulation.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:30:45.368Z"},"title":"CVE Program Container","references":[{"url":"https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-007/","tags":["x_transferred"]},{"name":"20230823 [KIS-2023-06] SugarCRM <= 12.2.0 (updateGeocodeStatus) Bean Manipulation Vulnerability","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2023/Aug/27"},{"url":"http://packetstormsecurity.com/files/174301/SugarCRM-12.2.0-Bean-Manipulation.html","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-17T16:27:48.601940Z","id":"CVE-2023-35809","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-17T16:28:37.652Z"}}]}}