First published: Wed Aug 11 2021(Updated: )
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr | >=3.3.1<=13.0.2 | |
Dolibarr ERP & CRM | =3.3.0-beta1 | |
Dolibarr ERP & CRM | =3.3.0-beta2 |
Update to 14.0.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Dolibarr application vulnerability is CVE-2021-25956.
The severity level of CVE-2021-25956 is high with a base score of 7.2.
This vulnerability affects Dolibarr application versions from v3.3.beta1_20121221 to v13.0.2, as well as Dolibarr Erp/crm versions 3.3.0-beta1 and 3.3.0-beta2.
An admin level user can exploit this vulnerability by modifying another user's details and failing to validate the already existing login name, leading to a complete account takeover of the victim user.
Yes, a fix for CVE-2021-25956 is available in the Dolibarr application. It is recommended to update to the latest version (v13.0.3 or above) to mitigate this vulnerability.