Vulnerabilities (CVE)

Filtered by vendor Dolibarr Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-25957 1 Dolibarr 1 Dolibarr 2021-08-24 6.5 MEDIUM 8.8 HIGH
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
CVE-2021-25956 1 Dolibarr 1 Dolibarr 2021-08-24 6.5 MEDIUM 7.2 HIGH
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
CVE-2020-12669 1 Dolibarr 1 Dolibarr 2021-07-21 6.5 MEDIUM 8.8 HIGH
core/get_menudiv.php in Dolibarr before 11.0.4 allows remote authenticated attackers to bypass intended access restrictions via a non-alphanumeric menu parameter.
CVE-2020-35136 1 Dolibarr 1 Dolibarr 2021-07-21 9.0 HIGH 7.2 HIGH
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.
CVE-2020-14209 1 Dolibarr 1 Dolibarr 2021-03-30 6.5 MEDIUM 8.8 HIGH
Dolibarr before 11.0.5 allows low-privilege users to upload files of dangerous types, leading to arbitrary code execution. This occurs because .pht and .phar files can be uploaded. Also, a .htaccess file can be uploaded to reconfigure access control (e.g., to let .noexe files be executed as PHP code to defeat the .noexe protection mechanism).
CVE-2019-11200 1 Dolibarr 1 Dolibarr Erp\/crm 2020-08-24 6.5 MEDIUM 8.8 HIGH
Dolibarr ERP/CRM 9.0.1 provides a web-based functionality that backs up the database content to a dump file. However, the application performs insufficient checks on the export parameters to mysqldump, which can lead to execution of arbitrary binaries on the server. (Malicious binaries can be uploaded by abusing other functionalities of the application.)
CVE-2018-10092 1 Dolibarr 1 Dolibarr 2020-08-24 6.0 MEDIUM 8.0 HIGH
The admin panel in Dolibarr before 7.0.2 might allow remote attackers to execute arbitrary commands by leveraging support for updating the antivirus command and parameters used to scan file uploads.
CVE-2020-14443 1 Dolibarr 1 Dolibarr 2020-06-24 6.5 MEDIUM 8.8 HIGH
A SQL injection vulnerability in accountancy/customer/card.php in Dolibarr 11.0.3 allows remote authenticated users to execute arbitrary SQL commands via the id parameter.
CVE-2020-11825 1 Dolibarr 1 Dolibarr 2020-04-20 6.8 MEDIUM 8.8 HIGH
In Dolibarr 10.0.6, forms are protected with a CSRF token against CSRF attacks. The problem is any CSRF token in any user's session can be used in another user's session. CSRF tokens should not be valid in this situation.
CVE-2019-19209 1 Dolibarr 1 Dolibarr 2020-03-18 5.0 MEDIUM 7.5 HIGH
Dolibarr ERP/CRM before 10.0.3 allows SQL Injection.
CVE-2019-15062 1 Dolibarr 1 Dolibarr 2019-08-28 6.0 MEDIUM 8.0 HIGH
An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, because the attack is from one of the application's own settings pages, this mechanism is bypassed.)
CVE-2019-11201 1 Dolibarr 1 Dolibarr Erp\/crm 2019-08-05 8.5 HIGH 8.0 HIGH
Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server.
CVE-2019-1010054 1 Dolibarr 1 Dolibarr 2019-07-19 6.8 MEDIUM 8.8 HIGH
Dolibarr 7.0.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: allow malitious html to change user password, disable users and disable password encryptation. The component is: Function User password change, user disable and password encryptation. The attack vector is: admin access malitious urls.
CVE-2018-19998 1 Dolibarr 1 Dolibarr 2019-01-11 6.5 MEDIUM 8.8 HIGH
SQL injection vulnerability in user/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the employee parameter.
CVE-2018-19994 1 Dolibarr 1 Dolibarr 2019-01-09 6.5 MEDIUM 8.8 HIGH
An error-based SQL injection vulnerability in product/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the desiredstock parameter.
CVE-2017-9839 1 Dolibarr 1 Dolibarr Erp\/crm 2018-05-16 6.5 MEDIUM 8.8 HIGH
Dolibarr ERP/CRM is affected by SQL injection in versions before 5.0.4 via product/stats/card.php (type parameter).
CVE-2017-18260 1 Dolibarr 1 Dolibarr Erp\/crm 2018-05-16 6.5 MEDIUM 8.8 HIGH
Dolibarr ERP/CRM is affected by multiple SQL injection vulnerabilities in versions through 7.0.0 via comm/propal/list.php (viewstatut parameter) or comm/propal/list.php (propal_statut parameter, aka search_statut parameter).
CVE-2017-17898 1 Dolibarr 1 Dolibarr 2018-01-09 5.0 MEDIUM 7.5 HIGH
Dolibarr ERP/CRM version 6.0.4 does not block direct requests to *.tpl.php files, which allows remote attackers to obtain sensitive information.
CVE-2017-14240 1 Dolibarr 1 Dolibarr 2017-09-18 5.0 MEDIUM 7.5 HIGH
There is a sensitive information disclosure vulnerability in document.php in Dolibarr ERP/CRM version 6.0.0 via the file parameter.
CVE-2017-9840 1 Dolibarr 1 Dolibarr 2017-06-30 6.5 MEDIUM 8.8 HIGH
Dolibarr ERP/CRM 5.0.3 and prior allows low-privilege users to upload files of dangerous types, which can result in arbitrary code execution within the context of the vulnerable application.