SQL Injection vulnerability in Dolibarr before version 7.0.2 allows remote attackers to execute arbitrary SQL commands via the sortfield parameter to /accountancy/admin/accountmodel.php, /accountancy/admin/categories_list.php, /accountancy/admin/journals_list.php, /admin/dict.php, /admin/mails_templates.php, or /admin/website.php.
References
Link | Resource |
---|---|
https://github.com/Dolibarr/dolibarr/commit/83b762b681c6dfdceb809d26ce95f3667b614739 | Patch |
https://github.com/Dolibarr/dolibarr/blob/7.0.2/ChangeLog | Release Notes |
https://www.oracle.com/security-alerts/cpujan2021.html | Third Party Advisory |
Information
Published : 2018-05-22 13:29
Updated : 2021-01-29 18:36
NVD link : CVE-2018-9019
Mitre link : CVE-2018-9019
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
dolibarr
- dolibarr
oracle
- data_integrator