Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-58258 PoC — SugarCRM 代码注入漏洞

Source
Associated Vulnerability
Title:SugarCRM 代码注入漏洞 (CVE-2024-58258)
Description:SugarCRM是美国SugarCRM公司的一套开源的客户关系管理系统(CRM)。该系统支持对不同的客户需求进行差异化营销、管理和分配销售线索,实现销售代表的信息共享和追踪。 SugarCRM 13.0.4之前版本和14.0.1之前版本存在代码注入漏洞,该漏洞源于API模块存在SSRF,可能导致有限类型的代码注入。
Description
Proof‑of‑concept for CVE‑2024‑58258, a SugarCRM (<13.0.4 / <14.0.1) flaw where user input is parsed as LESS in /css/preview, allowing unauthenticated SSRF or local file access.
Readme
# CVE‑2024‑58258 – SugarCRM SSRF & Local File Disclosure

## About

This repository provides a proof‑of‑concept for **CVE‑2024‑58258**, a
SugarCRM (\<13.0.4 / \<14.0.1) vulnerability where user input is parsed
as LESS in the `/css/preview` API, allowing unauthenticated SSRF or
local file access.

## Affected Versions

-   All commercial editions prior to **13.0.4**
-   All commercial editions prior to **14.0.1**

## Description

SugarCRM does not properly sanitize user‑supplied GET parameters in the
`/css/preview` REST endpoint. The input is interpreted as LESS code,
enabling attackers to inject arbitrary LESS directives.\
Abusing `@import` may allow: - **SSRF (Server‑Side Request Forgery)** -
**Local File Disclosure**

This can lead to exposure of internal or sensitive data.

## CLI Usage

    usage: main.py [options] target file_or_url

    positional arguments:
      target               Target SugarCRM URL
      file_or_url          File path or URL to access

    optional arguments:
      -p, --proxy PROXY    Proxy server
      -v, --verbose        Verbose output
      -t, --test           Test vulnerability first

## Credits

Vulnerability discovered by **Egidio Romano**.

## References

-   Karma In Security Advisory:
    https://karmainsecurity.com/KIS-2025-04
-   SugarCRM Security Advisory:
    https://support.sugarcrm.com/resources/security/sugarcrm-sa-2024-059/
-   Official SugarCRM Website: https://www.sugarcrm.com
-   CVE Entry:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58258

## Disclaimer

This project is for **educational and research purposes only**.\
Do not use this proof‑of‑concept on systems without explicit permission.
Unauthorized testing is illegal and unethical.
File Snapshot

[4.0K] /data/pocs/dcceb7f3ffd585cb396e9b7d9301b0ed7689c19d ├── [4.6K] main.py └── [1.7K] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.