Fixed in 6.0.5

2017-12-26 8:11 GMT+01:00 Salvatore Bonaccorso <car...@debian.org>:

> Source: dolibarr
> Version: 3.5.5+dfsg1-1
> Severity: grave
> Tags: patch security upstream
>
> Hi,
>
> the following vulnerabilities were published for dolibarr, filling
> only one bug for the four CVEs since afaict the common set of
> affectedversions to go back to at least 3.5.5+dfsg1-1.
>
> CVE-2017-14238[0]:
> | SQL injection vulnerability in admin/menus/edit.php in Dolibarr ERP/CRM
> | version 6.0.0 allows remote attackers to execute arbitrary SQL commands
> | via the menuId parameter.
>
> CVE-2017-14239[1]:
> | Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM
> | 6.0.0 allow remote authenticated users to inject arbitrary web script
> | or HTML via the (1) CompanyName, (2) CompanyAddress, (3) CompanyZip,
> | (4) CompanyTown, (5) Fax, (6) EMail, (7) Web, (8) ManagingDirectors,
> | (9) Note, (10) Capital, (11) ProfId1, (12) ProfId2, (13) ProfId3, (14)
> | ProfId4, (15) ProfId5, or (16) ProfId6 parameter to
> | htdocs/admin/company.php.
>
> CVE-2017-14240[2]:
> | There is a sensitive information disclosure vulnerability in
> | document.php in Dolibarr ERP/CRM version 6.0.0 via the file parameter.
>
> CVE-2017-14241[3]:
> | Cross-site scripting (XSS) vulnerability in Dolibarr ERP/CRM 6.0.0
> | allows remote authenticated users to inject arbitrary web script or
> | HTML via the Title parameter to htdocs/admin/menus/edit.php.
>
> If you fix the vulnerabilities please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
>
> For further information see:
>
> [0] https://security-tracker.debian.org/tracker/CVE-2017-14238
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14238
> [1] https://security-tracker.debian.org/tracker/CVE-2017-14239
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14239
> [2] https://security-tracker.debian.org/tracker/CVE-2017-14240
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14240
> [3] https://security-tracker.debian.org/tracker/CVE-2017-14241
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14241
> [4] https://github.com/Dolibarr/dolibarr/commit/
> d26b2a694de30f95e46ea54ea72cc54f0d38e548
>
> Regards,
> Salvatore
>
>


-- 
EMail: e...@destailleur.fr
Web: http://www.destailleur.fr
------------------------------------------------------------------------------------
Google+: https://plus.google.com/+LaurentDestailleur-Open-Source-Expert/
Facebook: https://www.facebook.com/Destailleur.Laurent
Twitter: http://www.twitter.com/eldy10
------------------------------------------------------------------------------------
* Dolibarr (Project leader): https://www.dolibarr.org (make a donation for
Dolibarr project via Paypal: cont...@destailleur.fr)
* AWStats (Author) : http://awstats.sourceforge.net (make a donation for
AWStats project via Paypal: cont...@destailleur.fr)
* AWBot (Author) : http://awbot.sourceforge.net
* CVSChangeLogBuilder (Author) : http://cvschangelogb.sourceforge.net

Reply via email to