Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
References
Link | Resource |
---|---|
https://github.com/Dolibarr/dolibarr | Product |
https://www.swascan.com/blog/ | Vendor Advisory |
https://www.swascan.com/security-advisory-dolibarr-17-0-0/ | Exploit Vendor Advisory |
Configurations
History
05 Jun 2023, 14:26
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 | |
First Time |
Dolibarr
Dolibarr dolibarr Erp\/crm |
|
CPE | cpe:2.3:a:dolibarr:dolibarr_erp\/crm:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://github.com/Dolibarr/dolibarr - Product | |
References | (MISC) https://www.swascan.com/security-advisory-dolibarr-17-0-0/ - Exploit, Vendor Advisory | |
References | (MISC) https://www.swascan.com/blog/ - Vendor Advisory |
29 May 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-29 21:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-30253
Mitre link : CVE-2023-30253
CVE.ORG link : CVE-2023-30253
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')