CVE-2017-18260: Dolibarr SQL injection vulnerability
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.45844%
CWE
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dolibarr/dolibarr | composer | <= 7.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from direct interpolation of user-controlled parameters into SQL queries in comm/propal/list.php. Both advisories explicitly identify: 1) viewstatut parameter vulnerable through 7.0.0 2) propal_statut (renamed to search_statut) vulnerable in the same file. The Wizlynx report demonstrates SQLi via these parameters through error-based and time-based injection techniques. While exact function names aren't provided, the main list.php processing logic handling these parameters constitutes the vulnerable code path. High confidence comes from multiple independent sources confirming the vulnerable parameters and attack vectors.