CVE-2017-17900:
Dolibarr SQL injection vulnerability in fourn/index.php
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dolibarr/dolibarr | composer | < 6.0.5 | 6.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the socid parameter in fourn/index.php. The original code directly accessed $_GET["socid"] without validation, making SQL queries using this parameter vulnerable to injection. The patch explicitly replaces $_GET access with GETPOST("socid", 'int'), which enforces type casting to an integer, neutralizing SQL injection vectors. This line change in the commit diff directly addresses the root cause, confirming the vulnerability's location and mechanism.