Multiple SQL injection vulnerabilities in Dolibarr 3.1.0 RC and probably earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) sortfield, (2) sortorder, and (3) sall parameters to user/index.php and (b) user/group/index.php; the id parameter to (4) info.php, (5) perms.php, (6) param_ihm.php, (7) note.php, and (8) fiche.php in user/; and (9) rowid parameter to admin/boxes.php.
References
Link | Resource |
---|---|
http://osvdb.org/77340 | Broken Link |
http://osvdb.org/77341 | Broken Link |
http://osvdb.org/77342 | Broken Link |
http://osvdb.org/77343 | Broken Link |
http://osvdb.org/77344 | Broken Link |
http://osvdb.org/77345 | Broken Link |
http://osvdb.org/77346 | Broken Link Exploit |
http://osvdb.org/77347 | Broken Link Exploit |
http://www.securityfocus.com/archive/1/520619/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/50777 | Exploit Third Party Advisory VDB Entry |
https://github.com/Dolibarr/dolibarr/commit/63820ab37537fdff842539425b2bf2881f0d8e91 | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/762f98ab4137749d0993612b4e3544a4207e78a1 | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/c539155d6ac2f5b6ea75b87a16f298c0090e535a | Exploit Patch |
https://github.com/Dolibarr/dolibarr/commit/d08d28c0cda1f762a47cc205d4363de03df16675 | Exploit Patch |
https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_dolibarr.html | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2011-12-14T00:00:00
Updated: 2018-10-09T18:57:01
Reserved: 2011-12-13T00:00:00
Link: CVE-2011-4802
JSON object: View
NVD Information
Status : Analyzed
Published: 2011-12-14T00:55:04.543
Modified: 2023-02-02T18:08:13.390
Link: CVE-2011-4802
JSON object: View
Redhat Information
No data.
CWE