First published: Wed Dec 23 2020(Updated: )
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr Erp\/crm | =12.0.3 | |
composer/dolibarr/dolibarr | <=12.0.3 | 12.0.4 |
=12.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-35136.
The severity of CVE-2020-35136 is critical with a CVSS score of 7.2.
The vulnerability in Dolibarr 12.0.3 occurs due to a flaw in the backup function of the admin dashboard, which allows an authenticated attacker to execute remote code.
An attacker who has access to the admin dashboard in Dolibarr 12.0.3 can exploit CVE-2020-35136.
Yes, a fix for CVE-2020-35136 is available. It is recommended to update to a patched version of Dolibarr.