Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://github.com/Dolibarr/dolibarr/releases | third party advisory |
https://sourceforge.net/projects/dolibarr/ | product third party advisory |
http://bilishim.com/2020/12/18/zero-hunting-2.html | third party advisory exploit |
https://github.com/Dolibarr/dolibarr/commit/4fcd3fe49332baab0e424225ad10b76b47ebcbac | third party advisory patch |