CVE-2024-36414

7.7 HIGH

📋 TL;DR

This vulnerability in SuiteCRM allows attackers to perform server-side request forgery (SSRF) attacks through the connectors file verification feature. It affects all SuiteCRM installations prior to versions 7.14.4 and 8.6.1. Attackers can potentially access internal systems and services that should not be externally reachable.

💻 Affected Systems

Products:
  • SuiteCRM
Versions: All versions prior to 7.14.4 and 8.6.1
Operating Systems: All platforms running SuiteCRM
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable if connectors feature is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network resources, data exfiltration from internal services, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized access to internal HTTP services, metadata harvesting from cloud providers, and potential data leakage from internal APIs.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only affecting isolated services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the connectors functionality but is technically straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.14.4 or 8.6.1

Vendor Advisory: https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-wg74-772c-8gr7

Restart Required: No

Instructions:

1. Backup your SuiteCRM installation and database. 2. Download the patched version (7.14.4 or 8.6.1) from the official SuiteCRM repository. 3. Replace the vulnerable files with the patched version. 4. Clear the cache and verify functionality.

🔧 Temporary Workarounds

Disable connectors module

all

Temporarily disable the connectors functionality to prevent exploitation

Navigate to Admin > Repair > Quick Repair and Rebuild
Disable connectors module in module manager

Network egress filtering

all

Implement strict outbound firewall rules to limit SSRF impact

Configure firewall to restrict SuiteCRM server outbound connections to only necessary services

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SuiteCRM from sensitive internal systems
  • Deploy a web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check SuiteCRM version in Admin > About or examine the version.php file

Check Version:

grep 'suitecrm_version' suitecrm/version.php

Verify Fix Applied:

Verify version is 7.14.4 or higher for 7.x branch, or 8.6.1 or higher for 8.x branch

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from SuiteCRM server
  • Requests to internal IP addresses or metadata services

Network Indicators:

  • HTTP requests from SuiteCRM server to internal-only services
  • Requests to cloud metadata endpoints (169.254.169.254)

SIEM Query:

source="suitecrm.log" AND (dest_ip=PRIVATE_IP_RANGE OR dest_ip=169.254.169.254)

🔗 References

📤 Share & Export