First published: Thu Jul 18 2019(Updated: )
Dolibarr 7.0.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: allow malitious html to change user password, disable users and disable password encryptation. The component is: Function User password change, user disable and password encryptation. The attack vector is: admin access malitious urls.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
composer/dolibarr/dolibarr | =7.0.0 | |
Dolibarr ERP & CRM | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010054 is considered to be a critical vulnerability due to its potential to allow malicious actions such as changing user passwords and disabling accounts.
To mitigate CVE-2019-1010054, it is advised to upgrade Dolibarr to a version higher than 7.0.0 where the vulnerability has been patched.
CVE-2019-1010054 affects the user password change functionality, user disablement feature, and password encryption processes within Dolibarr.
Exploitation of CVE-2019-1010054 could allow an attacker to change user passwords, disable users, and potentially compromise password encryption.
Any administrator using Dolibarr version 7.0.0 is vulnerable to CVE-2019-1010054, as the attack requires admin access.