Описание
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.
Ссылки
- ExploitThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ProductThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ProductThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:dolibarr:dolibarr_erp\/crm:12.0.3:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06993
Низкий
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-88
Связанные уязвимости
CVSS3: 7.2
ubuntu
около 5 лет назад
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.
CVSS3: 7.2
debian
около 5 лет назад
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. ...
EPSS
Процентиль: 91%
0.06993
Низкий
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-88