Multiple SQL injection vulnerabilities in Dolibarr 3.1.0 RC and probably earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) sortfield, (2) sortorder, and (3) sall parameters to user/index.php and (b) user/group/index.php; the id parameter to (4) info.php, (5) perms.php, (6) param_ihm.php, (7) note.php, and (8) fiche.php in user/; and (9) rowid parameter to admin/boxes.php.
References
Link | Resource |
---|---|
http://osvdb.org/77340 | Broken Link |
http://osvdb.org/77341 | Broken Link |
http://osvdb.org/77342 | Broken Link |
http://osvdb.org/77343 | Broken Link |
http://osvdb.org/77344 | Broken Link |
http://osvdb.org/77345 | Broken Link |
http://osvdb.org/77346 | Broken Link Exploit |
http://osvdb.org/77347 | Broken Link Exploit |
http://www.securityfocus.com/archive/1/520619/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/50777 | Exploit Third Party Advisory VDB Entry |
https://github.com/Dolibarr/dolibarr/commit/63820ab37537fdff842539425b2bf2881f0d8e91 | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/762f98ab4137749d0993612b4e3544a4207e78a1 | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/c539155d6ac2f5b6ea75b87a16f298c0090e535a | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/d08d28c0cda1f762a47cc205d4363de03df16675 | Exploit Patch |
https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_dolibarr.html | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2011-12-14 00:55
Updated : 2023-02-02 18:08
NVD link : CVE-2011-4802
Mitre link : CVE-2011-4802
CVE.ORG link : CVE-2011-4802
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')