First published: Tue May 22 2018(Updated: )
The admin panel in Dolibarr before 7.0.2 might allow remote attackers to execute arbitrary commands by leveraging support for updating the antivirus command and parameters used to scan file uploads.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr | <7.0.2 | |
composer/dolibarr/dolibarr | <7.0.2 | 7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-10092.
CVE-2018-10092 has a severity level of high (8).
Remote attackers can exploit CVE-2018-10092 by leveraging support for updating the antivirus command and parameters used to scan file uploads.
To fix CVE-2018-10092, upgrade Dolibarr to version 7.0.2 or later.
You can find more information about CVE-2018-10092 at the following references: [1](http://www.openwall.com/lists/oss-security/2018/05/21/2), [2](https://github.com/Dolibarr/dolibarr/blob/7.0.2/ChangeLog), [3](https://github.com/Dolibarr/dolibarr/commit/5d121b2d3ae2a95abebc9dc31e4782cbc61a1f39).