An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, because the attack is from one of the application's own settings pages, this mechanism is bypassed.)
References
Link | Resource |
---|---|
https://gauravnarwani.com/publications/CVE-2019-15062/ | Exploit Third Party Advisory |
https://github.com/Dolibarr/dolibarr/issues/11671 | Exploit Issue Tracking Patch Third Party Advisory |
https://gauravnarwani.com/publications/CVE-2019-15062/ | Exploit Third Party Advisory |
https://github.com/Dolibarr/dolibarr/issues/11671 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://gauravnarwani.com/publications/CVE-2019-15062/ - Exploit, Third Party Advisory | |
References | () https://github.com/Dolibarr/dolibarr/issues/11671 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2019-08-14 23:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-15062
Mitre link : CVE-2019-15062
CVE.ORG link : CVE-2019-15062
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-352
Cross-Site Request Forgery (CSRF)