Vulnerability identifier: #VU31295
Vulnerability risk: High
CVSSv3.1: 7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-77
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
dolibarr
Web applications /
CRM systems
Vendor: Dolibarr ERP & CRM
Description
The vulnerability allows a remote authenticated user to execute arbitrary code.
The admin panel in Dolibarr before 7.0.2 might allow remote attackers to execute arbitrary commands by leveraging support for updating the antivirus command and parameters used to scan file uploads.
Mitigation
Install update from vendor's website.
Vulnerable software versions
dolibarr: 7.0.0 - 7.0.1
External links
http://www.openwall.com/lists/oss-security/2018/05/21/2
http://github.com/Dolibarr/dolibarr/blob/7.0.2/ChangeLog
http://github.com/Dolibarr/dolibarr/commit/5d121b2d3ae2a95abebc9dc31e4782cbc61a1f39
http://sysdream.com/news/lab/2018-05-21-cve-2018-10092-dolibarr-admin-panel-authenticated-remote-code-execution-rce-vulnerability/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.