Description
Unrestricted file upload vulnerability in the Compose Email feature in the Emails module in Sugar Community Edition (aka SugarCRM) before 5.2f allows remote authenticated users to execute arbitrary code by uploading a file with only an extension in its name, then accessing the file via a direct request to a modified filename under cache/modules/Emails/, as demonstrated using .php as the entire original name.
Exploits (1)
References (4)
Core 4
Core References
Various Sources x_refsource_confirm
http://www.sugarforge.org/frs/download.php/5598/Sugar_CommunityEdition_ReleaseNotes_5.2f.pdf
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/35445
Exploit x_refsource_misc
http://www.ush.it/team/ush/hack-sugarcrm_520e/adv.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35361
Scores
EPSS
0.0901
EPSS Percentile
92.6%
Details
Status
published
Products (9)
sugarcrm/sugarcrm
5.0.0
sugarcrm/sugarcrm
5.0.0h
sugarcrm/sugarcrm
5.0.0k
sugarcrm/sugarcrm
5.1.0
sugarcrm/sugarcrm
5.1.0-beta
sugarcrm/sugarcrm
5.1c
sugarcrm/sugarcrm
5.2c
sugarcrm/sugarcrm
5.2d
sugarcrm/sugarcrm
< 5.2e
Published
Jun 22, 2009
Tracked Since
Feb 18, 2026