The admin panel in Dolibarr before 7.0.2 might allow remote attackers to execute arbitrary commands by leveraging support for updating the antivirus command and parameters used to scan file uploads.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2018/05/21/2 | Exploit Mailing List Technical Description Third Party Advisory |
https://github.com/Dolibarr/dolibarr/blob/7.0.2/ChangeLog | Release Notes |
https://github.com/Dolibarr/dolibarr/commit/5d121b2d3ae2a95abebc9dc31e4782cbc61a1f39 | Patch |
https://sysdream.com/news/lab/2018-05-21-cve-2018-10092-dolibarr-admin-panel-authenticated-remote-code-execution-rce-vulnerability/ | Exploit Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-05-22T20:00:00
Updated: 2018-05-22T19:57:01
Reserved: 2018-04-13T00:00:00
Link: CVE-2018-10092
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-05-22T20:29:01.117
Modified: 2020-08-24T17:37:01.140
Link: CVE-2018-10092
JSON object: View
Redhat Information
No data.
CWE