Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/Dolibarr/dolibarr | product |
https://www.swascan.com/blog/ | vendor advisory |
https://www.swascan.com/security-advisory-dolibarr-17-0-0/ | vendor advisory exploit |