Lucene search

K
openvasCopyright (C) 2017 Greenbone AGOPENVAS:1361412562310113000
HistorySep 19, 2017 - 12:00 a.m.

Dolibarr 6.0.0 Multiple Vulnerabilities

2017-09-1900:00:00
Copyright (C) 2017 Greenbone AG
plugins.openvas.org
10

6.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.1%

Dolibarr is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later

CPE = "cpe:/a:dolibarr:dolibarr";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.113000");
  script_version("2023-07-14T16:09:27+0000");
  script_tag(name:"last_modification", value:"2023-07-14 16:09:27 +0000 (Fri, 14 Jul 2023)");
  script_tag(name:"creation_date", value:"2017-09-19 08:36:42 +0200 (Tue, 19 Sep 2017)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2017-09-18 16:30:00 +0000 (Mon, 18 Sep 2017)");

  script_cve_id("CVE-2017-14238", "CVE-2017-14239", "CVE-2017-14240", "CVE-2017-14241",
                "CVE-2017-14242");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Dolibarr 6.0.0 Multiple Vulnerabilities");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_dolibarr_http_detect.nasl");
  script_mandatory_keys("dolibarr/detected");

  script_tag(name:"summary", value:"Dolibarr is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - SQL injection in admin/menus/edit.php via the menuId parameter

  - SQL injection in don/list.php via the statut parameter

  - XSS in htdocs/admin/company.php via the (1) CompanyName, (2) CompanyAddress, (3) CompanyZip,
  (4) CompanyTown, (5) Fax, (6) EMail, (7) Web, (8) ManagingDirectors, (9) Note, (10) Capital,
  (11) ProfId1, (12) ProfId2, (13) ProfId3, (14) ProfId4, (15) ProfId5, or (16) ProfId6 parameter

  - XSS in htdocs/admin/menus/edit.php via the Title parameter

  - Sensititve information disclosure in document.php via the file parameter");

  script_tag(name:"impact", value:"Successful exploitation will allow an attacker to execute
  arbitrary HTML and script code in a user's browser session in the context of a vulnerable site
  and to cause SQL Injection attacks to gain sensitive information.");

  script_tag(name:"affected", value:"Dolibarr version 6.0.0.");

  script_tag(name:"solution", value:"Update to version 6.0.1 or later.");

  script_xref(name:"URL", value:"https://github.com/Dolibarr/dolibarr/commit/d26b2a694de30f95e46ea54ea72cc54f0d38e548");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! port = get_app_port( cpe:CPE ) )
  exit( 0 );

if( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
  exit( 0 );

version = infos["version"];
location = infos["location"];

if( version_is_equal( version:version, test_version:"6.0.0" ) ) {
  report = report_fixed_ver( installed_version:version, fixed_version:"6.0.1", install_path:location );
  security_message( port: port, data: report );
  exit( 0 );
}

exit( 99 );

6.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.1%

Related for OPENVAS:1361412562310113000