Lucene search

K
githubGitHub Advisory DatabaseGHSA-9WQR-5JP4-MJMH
HistoryMay 29, 2023 - 9:30 p.m.

Dolibarr vulnerable to remote code execution via uppercase manipulation

2023-05-2921:30:17
GitHub Advisory Database
github.com
197
dolibarr
remote code execution
authenticated user
uppercase manipulation

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

82.2%

Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.

Affected configurations

Vulners
Node
dolibarrdolibarrRange<17.0.1
CPENameOperatorVersion
dolibarr/dolibarrlt17.0.1

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

82.2%