First published: Wed Dec 14 2011(Updated: )
Multiple SQL injection vulnerabilities in Dolibarr 3.1.0 RC and probably earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) sortfield, (2) sortorder, and (3) sall parameters to user/index.php and (b) user/group/index.php; the id parameter to (4) info.php, (5) perms.php, (6) param_ihm.php, (7) note.php, and (8) fiche.php in user/; and (9) rowid parameter to admin/boxes.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr Erp\/crm | =2.9.0 | |
Dolibarr Dolibarr Erp\/crm | =2.8.1 | |
Dolibarr Dolibarr Erp\/crm | <=3.1.0 | |
Dolibarr Dolibarr Erp\/crm | =2.6.0 | |
Dolibarr Dolibarr Erp\/crm | =3.0.0 | |
Dolibarr Dolibarr Erp\/crm | =2.7.1 | |
Dolibarr Dolibarr Erp\/crm | =2.6.1 | |
Dolibarr Dolibarr Erp\/crm | =2.5.0 | |
Dolibarr Dolibarr Erp\/crm | =2.7.0 | |
Dolibarr Dolibarr Erp\/crm | =2.8.0 | |
Dolibarr Dolibarr Erp\/crm | =3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.