Sploit.io - Search

Product: F-RevoCRM, version: version7.3.7 and version7.3.8

CVE-2023-41149

Severity: Unknown

Description: F-RevoCRM version7.3.7 and version7.3.8 contains an OS command injection vulnerability. If this vulnerability is exploited, an attacker who can access the product may execute an arbitrary OS command on the server where the product is running.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.005260000
  • Percentile: 0.670460000
  • Date: 2026-04-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 9116
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Thinkingreed Inc. F-RevoCRM - Versions: version7.3.7 and version7.3.8

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2023-41149, is an OS command injection flaw present in F-RevoCRM versions 7.3.7 and 7.3.8. This means an attacker who can execute commands on the underlying operating system of the server hosting the CRM, potentially gaining full control. The business impact can be significant, ranging from data breaches and data corruption to complete system compromise and denial of service. The likelihood of exploitation is moderate, as it requires access to the product, but the ease of exploitation is relatively high if access is gained, as OS command injection vulnerabilities are often straightforward to exploit. The impact on confidentiality is high, as attackers could steal sensitive customer and business data. Integrity is also high, as attackers could modify or delete data. Availability is also at risk, as an attacker could crash the server or consume resources, leading to downtime. The EPSS score of 0.005260000 suggests a low but present risk, especially considering the potential severity of a full OS compromise.

    2. Potential Attack Scenarios
    An attacker with valid credentials, even a low-privileged user, could leverage this vulnerability. Assume an attacker has access to a feature in F-RevoCRM that allows for some form of user-supplied input that is then passed to an OS command without proper sanitization. The attack vector is through this user input field. The attacker crafts a malicious input string, for example, by appending a shell metacharacter like a semicolon (;) to a standard command, followed by a new command. For instance, if the CRM uses a command to generate a report, the attacker could inject "; whoami" into the input. When the CRM executes the command, it will first generate the report and then execute “whoami”, revealing the user context the CRM is running under. An attacker could escalate this to more damaging commands like "; rm -rf /", potentially wiping out the entire server file system if executed with appropriate permissions, leading to data loss and system downtime.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade to a patched version of F-RevoCRM. Thinkingreed Inc. should be contacted for the latest version. Immediate action should be taken to patch all affected instances of F-RevoCRM versions 7.3.7 and 7.3.8. In the interim, while patching, input validation should be strengthened to sanitize user-supplied input before passing it to OS commands. This includes whitelisting allowed characters and escaping special characters. Consider implementing the principle of least privilege; ensure the F-RevoCRM process runs with the minimum necessary privileges to reduce the impact of a successful command injection. Further information can be found at the following resources: https://f-revocrm.jp/2023/08/9394/ and http://jvn.jp/en/jp/JVN78113802/. Regular vulnerability scanning of the server hosting F-RevoCRM should be conducted to identify and address similar vulnerabilities.

    4. Executive Summary
    F-RevoCRM versions 7.3.7 and 7.3.8 contain a critical vulnerability (CVE-2023-41149) that allows an attacker to execute arbitrary OS commands on the server running the CRM software. This could lead to data breaches, data corruption, or even complete system compromise. The risk is moderate, but the potential impact is high. We recommend immediate patching to the latest version of F-RevoCRM to mitigate this risk. If immediate patching is not possible, strengthen input validation to limit the attacker's ability to inject malicious commands. Failure to address this vulnerability could result in significant financial and reputational damage due to loss of customer data and business disruption. Prioritize this issue to protect our valuable CRM data and ensure continued business operations.