Miggo Logo

CVE-2017-18260: Dolibarr SQL injection vulnerability

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.45844%
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
dolibarr/dolibarrcomposer<= 7.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from direct interpolation of user-controlled parameters into SQL queries in comm/propal/list.php. Both advisories explicitly identify: 1) viewstatut parameter vulnerable through 7.0.0 2) propal_statut (renamed to search_statut) vulnerable in the same file. The Wizlynx report demonstrates SQLi via these parameters through error-based and time-based injection techniques. While exact function names aren't provided, the main list.php processing logic handling these parameters constitutes the vulnerable code path. High confidence comes from multiple independent sources confirming the vulnerable parameters and attack vectors.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*oli**rr *RP/*RM is *****t** *y multipl* SQL inj**tion vuln*r**iliti*s in v*rsions t*rou** *.*.* vi* *omm/prop*l/list.p*p (vi*wst*tut p*r*m*t*r) or *omm/prop*l/list.p*p (prop*l_st*tut p*r*m*t*r, *k* s**r**_st*tut p*r*m*t*r).

Reasoning

T** vuln*r**ility st*ms *rom *ir**t int*rpol*tion o* us*r-*ontroll** p*r*m*t*rs into SQL qu*ri*s in *omm/prop*l/list.p*p. *ot* **visori*s *xpli*itly i**nti*y: *) vi*wst*tut p*r*m*t*r vuln*r**l* t*rou** *.*.* *) prop*l_st*tut (r*n*m** to s**r**_st*tut