First published: Tue Feb 21 2012(Updated: )
Multiple directory traversal vulnerabilities in Dolibarr CMS 3.2.0 Alpha allow remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the (1) file parameter to document.php or (2) backtopage parameter in a create action to comm/action/fiche.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr ERP & CRM | =3.2.0-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1226 is considered to be of medium severity due to its potential for data exposure and malicious file access.
To fix CVE-2012-1226, upgrade Dolibarr CMS to a patched version that resolves the directory traversal vulnerabilities.
CVE-2012-1226 affects Dolibarr CMS version 3.2.0 Alpha.
The implications of CVE-2012-1226 include unauthorized access to sensitive files and possible execution of arbitrary code.
Yes, CVE-2012-1226 can be exploited remotely by attackers using specially crafted URL parameters.