Multiple SQL injection vulnerabilities in Dolibarr 3.1.0 RC and probably earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) sortfield, (2) sortorder, and (3) sall parameters to user/index.php and (b) user/group/index.php; the id parameter to (4) info.php, (5) perms.php, (6) param_ihm.php, (7) note.php, and (8) fiche.php in user/; and (9) rowid parameter to admin/boxes.php.
References
Link | Resource |
---|---|
http://osvdb.org/77340 | Broken Link |
http://osvdb.org/77341 | Broken Link |
http://osvdb.org/77342 | Broken Link |
http://osvdb.org/77343 | Broken Link |
http://osvdb.org/77344 | Broken Link |
http://osvdb.org/77345 | Broken Link |
http://osvdb.org/77346 | Broken Link Exploit |
http://osvdb.org/77347 | Broken Link Exploit |
http://www.securityfocus.com/archive/1/520619/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/50777 | Exploit Third Party Advisory VDB Entry |
https://github.com/Dolibarr/dolibarr/commit/63820ab37537fdff842539425b2bf2881f0d8e91 | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/762f98ab4137749d0993612b4e3544a4207e78a1 | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/c539155d6ac2f5b6ea75b87a16f298c0090e535a | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/d08d28c0cda1f762a47cc205d4363de03df16675 | Exploit Patch |
https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_dolibarr.html | Exploit |
Configurations
Configuration 1 (hide)
|
History
02 Feb 2023, 18:08
Type | Values Removed | Values Added |
---|---|---|
References | (BID) http://www.securityfocus.com/bid/50777 - Exploit, Third Party Advisory, VDB Entry | |
References | (OSVDB) http://osvdb.org/77344 - Broken Link | |
References | (OSVDB) http://osvdb.org/77347 - Broken Link, Exploit | |
References | (OSVDB) http://osvdb.org/77343 - Broken Link | |
References | (OSVDB) http://osvdb.org/77346 - Broken Link, Exploit | |
References | (OSVDB) http://osvdb.org/77345 - Broken Link | |
References | (OSVDB) http://osvdb.org/77340 - Broken Link | |
References | (OSVDB) http://osvdb.org/77342 - Broken Link | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/520619/100/0/threaded - Third Party Advisory, VDB Entry | |
References | (OSVDB) http://osvdb.org/77341 - Broken Link |
17 Nov 2022, 17:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dolibarr:dolibarr:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.8.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.9.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr:3.0.1:*:*:*:*:*:*:* |
cpe:2.3:a:dolibarr:dolibarr_erp\/crm:*:rc:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.9.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.8.1:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:dolibarr:dolibarr_erp\/crm:2.8.0:*:*:*:*:*:*:* |
First Time |
Dolibarr dolibarr Erp\/crm
|
Information
Published : 2011-12-14 00:55
Updated : 2023-12-10 11:03
NVD link : CVE-2011-4802
Mitre link : CVE-2011-4802
CVE.ORG link : CVE-2011-4802
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')