Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
References
Link | Resource |
---|---|
https://github.com/Dolibarr/dolibarr | Product |
https://www.swascan.com/blog/ | Vendor Advisory |
https://www.swascan.com/security-advisory-dolibarr-17-0-0/ | Exploit Vendor Advisory |
https://github.com/Dolibarr/dolibarr | Product |
https://www.swascan.com/blog/ | Vendor Advisory |
https://www.swascan.com/security-advisory-dolibarr-17-0-0/ | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-05-29 21:15
Updated : 2025-01-14 17:15
NVD link : CVE-2023-30253
Mitre link : CVE-2023-30253
CVE.ORG link : CVE-2023-30253
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')