CVE-2017-14240:
Dolibarr ERP and CRM Sensitive Data Disclosure
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50222%
CWE
Published
5/17/2022
Updated
9/18/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dolibarr/dolibarr | composer | <= 6.0.0 | 6.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the 'file' parameter in document.php. The commit diff shows critical changes where $original_file (derived from user input) was replaced with $fullpath_original_file after security checks. Pre-patch versions lacked adequate validation for directory traversal patterns (../) and dangerous characters, allowing attackers to disclose sensitive files by manipulating the file parameter. The code directly used user input to build filesystem paths without proper normalization, matching the CWE-200 exposure pattern.