First published: Wed Apr 11 2018(Updated: )
Dolibarr ERP/CRM is affected by multiple SQL injection vulnerabilities in versions through 7.0.0 via comm/propal/list.php (viewstatut parameter) or comm/propal/list.php (propal_statut parameter, aka search_statut parameter).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/dolibarr/dolibarr | <=7.0.0 | |
Dolibarr ERP & CRM | <=7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18260 is classified as a high severity vulnerability due to its exploitation potential via SQL injection.
To fix CVE-2017-18260, it's recommended to upgrade Dolibarr ERP/CRM to version 7.1.0 or later.
CVE-2017-18260 affects all Dolibarr ERP/CRM versions up to and including 7.0.0.
CVE-2017-18260 allows for SQL injection attacks, which can lead to unauthorized access to database information.
The vulnerability in CVE-2017-18260 is triggered by the 'viewstatut' and 'propal_statut' parameters in the file comm/propal/list.php.