Miggo Logo

CVE-2021-3991: Improper Authorization in dolibarr/dolibarr

4.3

CVSS Score
3.0

Basic Information

EPSS Score
0.1952%
Published
11/15/2024
Updated
11/19/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
dolibarr/dolibarrcomposer< 15.0.015.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from 3 key issues: 1) Misplaced authorization check in card.php that executed after resource initialization, 2) Hardcoded permission checks in dispatch.php that didn't account for module enablement status, and 3) Cross-module permission inheritance in reception/card.php. The patch shows these functions were modified to implement conditional permission handling based on $conf->reception->enabled status, indicating they previously allowed unauthorized access through direct URL parameters by not properly validating() module-specific permissions. The confidence is high as the commit diff directly modifies authorization logic in these files to address the described vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n Improp*r *ut*oriz*tion vuln*r**ility *xists in *oli**rr v*rsions prior to v*rsion **.*.*. * us*r wit* r*stri*t** p*rmissions in t** 'R***ption' s**tion is **l* to ****ss sp**i*i* r***ption **t*ils vi* *ir**t URL ****ss, *yp*ssin* t** int*n*** p*rm

Reasoning

T** vuln*r**ility st*mm** *rom * k*y issu*s: *) Mispl**** *ut*oriz*tion ****k in `**r*.p*p` t**t *x**ut** **t*r r*sour** initi*liz*tion, *) **r**o*** p*rmission ****ks in `*isp*t**.p*p` t**t *i*n't ***ount *or mo*ul* *n**l*m*nt st*tus, *n* *) *ross-m