First published: Mon Jul 29 2019(Updated: )
Dolibarr ERP/CRM 9.0.1 provides a web-based functionality that backs up the database content to a dump file. However, the application performs insufficient checks on the export parameters to mysqldump, which can lead to execution of arbitrary binaries on the server. (Malicious binaries can be uploaded by abusing other functionalities of the application.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/dolibarr/dolibarr | <9.0.3 | 9.0.3 |
Dolibarr ERP & CRM | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11200 has a medium severity rating due to the potential for arbitrary code execution via insufficient checks on export parameters.
To fix CVE-2019-11200, upgrade Dolibarr ERP/CRM to version 9.0.3 or later where the vulnerability has been addressed.
CVE-2019-11200 specifically affects Dolibarr ERP/CRM version 9.0.1.
Yes, CVE-2019-11200 enables an attacker to execute arbitrary binaries on the server due to insufficient parameter validation.
CVE-2019-11200 primarily impacts the web-based database backup functionality of Dolibarr ERP/CRM.