Dolibarr ERP/CRM before 5.0.3 is vulnerable to a SQL injection in user/index.php (search_supervisor and search_statut parameters).
References
Link | Resource |
---|---|
https://github.com/Dolibarr/dolibarr/blob/develop/ChangeLog | Patch Release Notes Vendor Advisory |
https://github.com/Dolibarr/dolibarr/commit/70636cc59ffa1ffbc0ce3dba315d7d9b837aad04 | Patch |
https://github.com/Dolibarr/dolibarr/blob/develop/ChangeLog | Patch Release Notes Vendor Advisory |
https://github.com/Dolibarr/dolibarr/commit/70636cc59ffa1ffbc0ce3dba315d7d9b837aad04 | Patch |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Dolibarr/dolibarr/blob/develop/ChangeLog - Patch, Release Notes, Vendor Advisory | |
References | () https://github.com/Dolibarr/dolibarr/commit/70636cc59ffa1ffbc0ce3dba315d7d9b837aad04 - Patch |
Information
Published : 2017-06-05 14:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9435
Mitre link : CVE-2017-9435
CVE.ORG link : CVE-2017-9435
JSON object : View
Products Affected
dolibarr
- dolibarr
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')