Miggo Logo

CVE-2020-11825: Dolibarr Cross-Site Request Forgery Vulnerability

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.37357%
Published
5/24/2022
Updated
7/17/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
dolibarr/dolibarrcomposer<= 10.0.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description indicates that CSRF tokens were not properly scoped to individual user sessions, allowing cross-session reuse. This suggests flaws in either the token generation/validation logic or session binding mechanisms. However, without access to the specific codebase, commit diffs, or patch details, it's impossible to identify exact function names and file paths with high confidence. The root cause likely resides in functions handling CSRF token storage/retrieval (e.g., token generation without session-specific entropy, or validation that checks token existence globally rather than per-session), but insufficient public implementation details prevent precise identification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *oli**rr **.*.*, *orms *r* prot**t** wit* * *ross-Sit* R*qu*st *or**ry (*SR*) tok*n ***inst *SR* *tt**ks. T** pro*l*m is *ny *SR* tok*n in *ny us*r's s*ssion **n ** us** in *not**r us*r's s*ssion. *SR* tok*ns s*oul* not ** v*li* in t*is situ*tion.

Reasoning

T** vuln*r**ility **s*ription in*i**t*s t**t *SR* tok*ns w*r* not prop*rly s*op** to in*ivi*u*l us*r s*ssions, *llowin* *ross-s*ssion r*us*. T*is su***sts *l*ws in *it**r t** tok*n **n*r*tion/`v*li**tion` lo*i* or s*ssion *in*in* m****nisms. *ow*v*r,