Multiple SQL injection vulnerabilities in Dolibarr 3.1.0 RC and probably earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) sortfield, (2) sortorder, and (3) sall parameters to user/index.php and (b) user/group/index.php; the id parameter to (4) info.php, (5) perms.php, (6) param_ihm.php, (7) note.php, and (8) fiche.php in user/; and (9) rowid parameter to admin/boxes.php.
References
Link | Resource |
---|---|
http://osvdb.org/77341 | Broken Link |
http://osvdb.org/77346 | Broken Link Exploit |
https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_dolibarr.html | Exploit |
https://github.com/Dolibarr/dolibarr/commit/c539155d6ac2f5b6ea75b87a16f298c0090e535a | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/d08d28c0cda1f762a47cc205d4363de03df16675 | Exploit Patch |
http://www.securityfocus.com/bid/50777 | Exploit Third Party Advisory VDB Entry |
https://github.com/Dolibarr/dolibarr/commit/63820ab37537fdff842539425b2bf2881f0d8e91 | Exploit Patch |
http://osvdb.org/77343 | Broken Link |
http://osvdb.org/77347 | Broken Link Exploit |
http://osvdb.org/77340 | Broken Link |
https://github.com/Dolibarr/dolibarr/commit/762f98ab4137749d0993612b4e3544a4207e78a1 | Exploit Patch |
http://osvdb.org/77342 | Broken Link |
http://osvdb.org/77344 | Broken Link |
http://osvdb.org/77345 | Broken Link |
http://www.securityfocus.com/archive/1/520619/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2011-12-13 16:55
Updated : 2023-02-02 10:08
NVD link : CVE-2011-4802
Mitre link : CVE-2011-4802
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
dolibarr
- dolibarr_erp\/crm