{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-49772","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-10-18T13:43:23.458Z","datePublished":"2024-11-05T18:31:20.615Z","dateUpdated":"2024-11-05T19:00:51.220Z"},"containers":{"cna":{"title":"Authenticated SQL injection in AM_ProjectTemplates controller in SuiteCRM","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-4xj8-hr85-hm3m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-4xj8-hr85-hm3m"}],"affected":[{"vendor":"salesagility","product":"SuiteCRM","versions":[{"version":"< 7.14.6","status":"affected"},{"version":">= 8.0.0, < 8.7.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-11-05T18:31:20.615Z"},"descriptions":[{"lang":"en","value":"SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In SuiteCRM versions 7.14.4, poor input validation allows authenticated user do a SQL injection attack. Authenticated user with low pivilege can leak all data in database. This issue has been addressed in releases 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability."}],"source":{"advisory":"GHSA-4xj8-hr85-hm3m","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"salesagility","product":"suitecrm","cpes":["cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"7.14.6","versionType":"custom"},{"version":"8.0.0","status":"affected","lessThan":"8.7.1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-05T19:00:15.770112Z","id":"CVE-2024-49772","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-05T19:00:51.220Z"}}]}}