cve/2023/CVE-2023-47643.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-47643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47643)
![](https://img.shields.io/static/v1?label=Product&message=SuiteCRM-Core&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%208.4.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
SuiteCRM is a Customer Relationship Management (CRM) software application. Prior to version 8.4.2, Graphql Introspection is enabled without authentication, exposing the scheme defining all object types, arguments, and functions. An attacker can obtain the GraphQL schema and understand the entire attack surface of the API, including sensitive fields such as UserHash. This issue is patched in version 8.4.2. There are no known workarounds.
### POC
#### Reference
- https://github.com/salesagility/SuiteCRM-Core/security/advisories/GHSA-fxww-jqfv-9rrr
#### Github
No PoCs found on GitHub currently.