SQL Injection Affecting dolibarr/dolibarr package, versions >=3.8.0, <7.0.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-DOLIBARRDOLIBARR-173766
- published 7 Mar 2019
- disclosed 7 Mar 2019
- credit Romain Koszyk, Erwan Robin, chqrly from DIGITEMIS CYBERSECURITY and PRIVACY.
Introduced: 7 Mar 2019
CVE-2018-16809 Open this link in a new tabHow to fix?
Upgrade dolibarr/dolibarr
to version 7.0.1 or higher.
Overview
dolibarr/dolibarr is a modern and easy to use web software to manage your business.
Affected versions of this package are vulnerable to SQL Injection via the integer parameters qty
and value_unit
.
When editing a billing at /expensereport/card.phpid=$id_integer&action=editline&rowid=$rowid_integer
, the POST parameters fail to properly sanitise the parameters due to the application using a recursive call to an eregi()
or a preg_match()
regex to determine the legitimacy of the query being processed. This allows the integer parameters qty
, value_unit
to be abused efficiently.