9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.042 Low
EPSS
Percentile
92.3%
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An
attacker who has the access the admin dashboard can manipulate the backup
function by inserting a payload into the filename for the
zipfilename_template parameter to admin/tools/dolibarr_export.php.
bilishim.com/2020/12/18/zero-hunting-2.html
github.com/Dolibarr/dolibarr/commit/4fcd3fe49332baab0e424225ad10b76b47ebcbac
github.com/Dolibarr/dolibarr/releases
launchpad.net/bugs/cve/CVE-2020-35136
nvd.nist.gov/vuln/detail/CVE-2020-35136
security-tracker.debian.org/tracker/CVE-2020-35136
sourceforge.net/projects/dolibarr/
www.cve.org/CVERecord?id=CVE-2020-35136
9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.042 Low
EPSS
Percentile
92.3%