SugarCRM ≤ 14.0.0 (css/preview) LESS Code Injection Vulnerab... #1119
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
SugarCRM ≤ 14.0.0 (css/preview) LESS Code Injection Vulnerability
Software Link: https://www.sugarcrm.com
Affected Versions
All commercial SugarCRM releases prior to 13.0.4 and 14.0.1.
Vulnerability Description
The
/rest/v10/css/preview
endpoint accepts user-supplied GET parameters (e.g.?baseUrl=…&lm=…
) and embeds them directly...🔧 Technical Details
LESS code injection via unsanitized GET parameter: By embedding attacker-controlled input directly into the LESS source, one can terminate the current statement (e.g., using a semicolon) and append new LESS directives, enabling arbitrary code execution at the stylesheet preprocessing stage.
Abusing the LESS
@import (inline)
directive: This feature fetches and inlines external resources—local files (viafile://
) or remote URLs—into the compiled CSS. An attacker ...🤖 Agent Actions
Added detailed coverage for LESS code injection leading to SSRF & local file read:
Created new page
•
src/pentesting-web/less-code-injection-ssrf.md
– Explains LESS injection, exploitation with
@import (inline)
, PoC, detection, mitigations, and real‐world SugarCRM case.– Includes references and HackTricks training banners.
Linked the new page from a related section
• Updated
src/pentesting-web/ssrf-server-side-request-forgery/ssrf-vulnerable-platforms.md
– Added SugarCRM bullet with reference link to the new LESS injection page.
These updates integrate the new technique into existing SSRF documentation for easier discovery.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).