Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-36416

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-10 Jun, 2024 | 20:03
Updated At-13 Feb, 2025 | 17:52
Rejected At-
Credits

SuiteCRM v4 API Excessive log data DOS

SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:10 Jun, 2024 | 20:03
Updated At:13 Feb, 2025 | 17:52
Rejected At:
▼CVE Numbering Authority (CNA)
SuiteCRM v4 API Excessive log data DOS

SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue.

Affected Products
Vendor
SalesAgility Ltd.salesagility
Product
SuiteCRM
Versions
Affected
  • < 7.14.4
  • >= 8.0.0, < 8.6.1
Problem Types
TypeCWE IDDescription
CWECWE-779CWE-779: Logging of Excessive Data
Type: CWE
CWE ID: CWE-779
Description: CWE-779: Logging of Excessive Data
Metrics
VersionBase scoreBase severityVector
3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77
x_refsource_CONFIRM
https://docs.suitecrm.com/admin/releases/7.14.x/
N/A
https://github.com/kva55/CVE-2024-36416
N/A
Hyperlink: https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77
Resource:
x_refsource_CONFIRM
Hyperlink: https://docs.suitecrm.com/admin/releases/7.14.x/
Resource: N/A
Hyperlink: https://github.com/kva55/CVE-2024-36416
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
SalesAgility Ltd.salesagility
Product
suitecrm
CPEs
  • cpe:2.3:a:salesagility:suitecrm:7.0.0:*:*:*:*:*:*:*
Default Status
affected
Versions
Affected
  • From 7.0.0 before 7.14.4 (custom)
  • From 8.0.0 before 8.6.1 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77
x_refsource_CONFIRM
x_transferred
https://docs.suitecrm.com/admin/releases/7.14.x/
x_transferred
https://github.com/kva55/CVE-2024-36416
x_transferred
Hyperlink: https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://docs.suitecrm.com/admin/releases/7.14.x/
Resource:
x_transferred
Hyperlink: https://github.com/kva55/CVE-2024-36416
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:10 Jun, 2024 | 20:15
Updated At:22 Jul, 2024 | 17:15

SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CPE Matches

SalesAgility Ltd.
salesagility
>>suitecrm>>Versions before 7.14.4(exclusive)
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
SalesAgility Ltd.
salesagility
>>suitecrm>>Versions from 8.0.0(inclusive) to 8.6.1(exclusive)
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE-779Secondarysecurity-advisories@github.com
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-779
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.suitecrm.com/admin/releases/7.14.x/security-advisories@github.com
N/A
https://github.com/kva55/CVE-2024-36416security-advisories@github.com
N/A
https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77security-advisories@github.com
Vendor Advisory
Hyperlink: https://docs.suitecrm.com/admin/releases/7.14.x/
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/kva55/CVE-2024-36416
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77
Source: security-advisories@github.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2024-13925
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.10% / 28.17%
||
7 Day CHG~0.00%
Published-17 Apr, 2025 | 06:00
Updated-27 Aug, 2025 | 12:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Klarna Checkout for WooCommerce < 2.13.5 - DoS via Excessive Logging

The Klarna Checkout for WooCommerce WordPress plugin before 2.13.5 exposes an unauthenticated WooCommerce Ajax endpoint that allows an attacker to flood the log files with data at the maximum size allowed for a POST parameter per request. This can result in rapid consumption of disk space, potentially filling the entire disk.

Action-Not Available
Vendor-klarnaUnknown
Product-klarna_checkout_for_woocommerceKlarna Checkout for WooCommerce
CWE ID-CWE-779
Logging of Excessive Data
CVE-2024-55628
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.24%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 18:02
Updated-31 Mar, 2025 | 13:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Suricata oversized resource names utilizing DNS name compression can lead to resource starvation

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8.

Action-Not Available
Vendor-oisfOISF
Product-suricatasuricata
CWE ID-CWE-405
Asymmetric Resource Consumption (Amplification)
CWE ID-CWE-779
Logging of Excessive Data
Details not found