The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://trovent.io/security-advisory-2106-01 | third party advisory exploit |
https://trovent.github.io/security-advisories/TRSA-2106-01/TRSA-2106-01.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2021/Nov/39 | mailing list third party advisory exploit |