Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-58258 PoC — SugarCRM 代码注入漏洞

Source
Associated Vulnerability
Title:SugarCRM 代码注入漏洞 (CVE-2024-58258)
Description:SugarCRM before 13.0.4 and 14.x before 14.0.1 allows SSRF in the API module because a limited type of code injection can occur.
Description
Proof‑of‑concept for CVE‑2024‑58258, a SugarCRM (<13.0.4 / <14.0.1) flaw where user input is parsed as LESS in /css/preview, allowing unauthenticated SSRF or local file access.
Readme
# CVE‑2024‑58258 – SugarCRM SSRF & Local File Disclosure

## About

This repository provides a proof‑of‑concept for **CVE‑2024‑58258**, a
SugarCRM (\<13.0.4 / \<14.0.1) vulnerability where user input is parsed
as LESS in the `/css/preview` API, allowing unauthenticated SSRF or
local file access.

## Affected Versions

-   All commercial editions prior to **13.0.4**
-   All commercial editions prior to **14.0.1**

## Description

SugarCRM does not properly sanitize user‑supplied GET parameters in the
`/css/preview` REST endpoint. The input is interpreted as LESS code,
enabling attackers to inject arbitrary LESS directives.\
Abusing `@import` may allow: - **SSRF (Server‑Side Request Forgery)** -
**Local File Disclosure**

This can lead to exposure of internal or sensitive data.

## CLI Usage

    usage: main.py [options] target file_or_url

    positional arguments:
      target               Target SugarCRM URL
      file_or_url          File path or URL to access

    optional arguments:
      -p, --proxy PROXY    Proxy server
      -v, --verbose        Verbose output
      -t, --test           Test vulnerability first

## Credits

Vulnerability discovered by **Egidio Romano**.

## References

-   Karma In Security Advisory:
    https://karmainsecurity.com/KIS-2025-04
-   SugarCRM Security Advisory:
    https://support.sugarcrm.com/resources/security/sugarcrm-sa-2024-059/
-   Official SugarCRM Website: https://www.sugarcrm.com
-   CVE Entry:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58258

## Disclaimer

This project is for **educational and research purposes only**.\
Do not use this proof‑of‑concept on systems without explicit permission.
Unauthorized testing is illegal and unethical.
File Snapshot

[4.0K] /data/pocs/dcceb7f3ffd585cb396e9b7d9301b0ed7689c19d ├── [4.6K] main.py └── [1.7K] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →