CVE-2020-28328
📋 TL;DR
This vulnerability in SuiteCRM allows remote code execution by manipulating the Log File Name setting to point to an attacker-controlled PHP file. It requires admin account takeover first, then enables attackers to execute arbitrary code on the server. Organizations running vulnerable SuiteCRM versions are affected.
💻 Affected Systems
- SuiteCRM
📦 What is this software?
Suitecrm by Salesagility
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, ransomware deployment, or use as a foothold for lateral movement within the network.
Likely Case
Webshell installation allowing persistent access, data exfiltration, and further exploitation of the compromised system.
If Mitigated
Limited impact due to proper access controls, network segmentation, and monitoring preventing successful admin takeover.
🎯 Exploit Status
Requires two-step attack: first compromise admin credentials, then exploit the vulnerable setting. Multiple public exploit scripts exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.11.17 or later
Vendor Advisory: https://suitecrm.com/suitecrm-7-11-17-7-10-28-lts-versions-released/
Restart Required: No
Instructions:
1. Backup your SuiteCRM instance and database. 2. Download SuiteCRM 7.11.17 or later from the official website. 3. Follow the SuiteCRM upgrade documentation to apply the patch. 4. Verify the upgrade completed successfully.
🔧 Temporary Workarounds
Restrict admin access
allImplement strict access controls for admin accounts including MFA, IP whitelisting, and strong password policies.
File permission hardening
linuxRestrict write permissions to web directories and implement file integrity monitoring.
chmod -R 755 /path/to/suitecrm/
chown -R www-data:www-data /path/to/suitecrm/
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block suspicious file write attempts to PHP files
- Enable detailed logging and monitoring for admin account activity and file system changes
🔍 How to Verify
Check if Vulnerable:
Check SuiteCRM version in admin panel or via config.php file. Versions below 7.11.17 are vulnerable.
Check Version:
Check config.php for 'suitecrm_version' or view in Admin → System Settings → System Information
Verify Fix Applied:
Verify version is 7.11.17 or higher and check that the logger_file_name setting cannot be modified to point to arbitrary PHP files.
📡 Detection & Monitoring
Log Indicators:
- Unusual admin login attempts
- Modifications to config.php or logger settings
- Unexpected PHP file creation in web directories
Network Indicators:
- POST requests to admin settings with file path manipulation
- Unusual outbound connections from web server
SIEM Query:
source="suitecrm.log" AND ("admin login" OR "config.php" OR "logger_file_name")
🔗 References
- http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html
- https://github.com/mcorybillington/SuiteCRM-RCE
- https://suitecrm.com/suitecrm-7-11-17-7-10-28-lts-versions-released/
- http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162975/SuiteCRM-Log-File-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/165001/SuiteCRM-7.11.18-Remote-Code-Execution.html
- https://github.com/mcorybillington/SuiteCRM-RCE
- https://suitecrm.com/suitecrm-7-11-17-7-10-28-lts-versions-released/