The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/Nov/39 | Exploit Mailing List Third Party Advisory |
https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt | Exploit Third Party Advisory |
https://trovent.io/security-advisory-2106-01 | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2021/Nov/39 | Exploit Mailing List Third Party Advisory |
https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt | Exploit Third Party Advisory |
https://trovent.io/security-advisory-2106-01 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2021/Nov/39 - Exploit, Mailing List, Third Party Advisory | |
References | () https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt - Exploit, Third Party Advisory | |
References | () https://trovent.io/security-advisory-2106-01 - Exploit, Third Party Advisory |
Information
Published : 2021-11-10 23:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33816
Mitre link : CVE-2021-33816
CVE.ORG link : CVE-2021-33816
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')