SuiteCRM before 7.2.3 allows remote attackers to execute arbitrary code.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://github.com/salesagility/SuiteCRM/commit/b1b3fd61c7697ad2073cd253d31c9462929e7bb5 | third party advisory |
http://www.openwall.com/lists/oss-security/2015/08/06/6 | mailing list |
https://github.com/salesagility/SuiteCRM/issues/333 | issue tracking exploit third party advisory |
https://github.com/XiphosResearch/exploits/tree/master/suiteshell | third party advisory exploit |