Lucene search

K
githubGitHub Advisory DatabaseGHSA-7CM4-VMF2-8WF2
HistoryOct 12, 2022 - 7:00 p.m.

Dolibarr vulnerable to Eval Injection

2022-10-1219:00:42
CWE-95
GitHub Advisory Database
github.com
52
dolibarr
eval injection
erp & crm
vulnerable
version 15.0.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

68.8%

Dolibarr ERP & CRM <=15.0.3 are vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval.

Affected configurations

Vulners
Node
dolibarrdolibarrRange15.0.3
CPENameOperatorVersion
dolibarr/dolibarrle15.0.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

68.8%