Full Disclosure mailing list archives
[HTTPCS] 52 Vulnerabilities in Dolibarr
From: HTTPCS <contact () httpcs com>
Date: Fri, 19 Oct 2012 15:25:14 +0200 (CEST)
HTTPCS Advisory : HTTPCS94 Product : Dolibarr Version : 3.2.2 Date : 2012-10-19 Criticality level : Highly Critical Description : A vulnerability has been discovered in Dolibarr, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'rights' parameter to '/user/perms.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /user/perms.php Variables : action=delrights&id=1&rights=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs94 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS93 Product : Dolibarr Version : 3.2.2 Date : 2012-10-19 Criticality level : Highly Critical Description : A vulnerability has been discovered in Dolibarr, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'module' parameter to '/user/perms.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /user/perms.php Variables : action=addrights&id=1&module=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs93 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS92 Product : Dolibarr Version : 3.2.2 Date : 2012-10-19 Criticality level : Less Critical Description : A vulnerability has been discovered in Dolibarr, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'mode' parameter to '/admin/modules.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Page : /admin/modules.php Variables : mode=[VulnHTTPCS] Type : XSS Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs92 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ https://www.httpcs.com/advisories _______________________________________________ Twitter : http://twitter.com/HTTPCS_ Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [HTTPCS] 52 Vulnerabilities in Dolibarr HTTPCS (Oct 19)