CVE-2021-42840

HIGH

Salesagility Suitecrm < 7.11.19 - Unrestricted File Upload

Title source: rule

Description

SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blocked. NOTE: this issue exists because of an incomplete fix for CVE-2020-28328.

Exploits (2)

exploitdb WORKING POC VERIFIED
by M. Cory Billington · rubywebappsphp
https://www.exploit-db.com/exploits/50531
metasploit WORKING POC GOOD
by M. Cory Billington · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/suitecrm_log_file_rce.rb

Scores

CVSS v3 8.8
EPSS 0.4911
EPSS Percentile 97.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-434
Status published
Products (1)
salesagility/suitecrm < 7.11.19
Published Oct 22, 2021
Tracked Since Feb 18, 2026