SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the file_name parameter of the Step3 import functionality.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/salesagility/SuiteCRM | product third party advisory |
https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33 | release notes vendor advisory |
https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22 | release notes vendor advisory |
https://github.com/ach-ing/cves/blob/main/CVE-2021-41595.md | third party advisory |