Vulnerability Description
An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, because the attack is from one of the application's own settings pages, this mechanism is bypassed.)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dolibarr | Dolibarr Erp\/Crm | 11.0.0 |
Related Weaknesses (CWE)
References
- https://gauravnarwani.com/publications/CVE-2019-15062/ExploitThird Party Advisory
- https://github.com/Dolibarr/dolibarr/issues/11671ExploitIssue TrackingPatch
- https://gauravnarwani.com/publications/CVE-2019-15062/ExploitThird Party Advisory
- https://github.com/Dolibarr/dolibarr/issues/11671ExploitIssue TrackingPatch
FAQ
What is CVE-2019-15062?
CVE-2019-15062 is a vulnerability with a CVSS score of 8.0 (HIGH). An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could ...
How severe is CVE-2019-15062?
CVE-2019-15062 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15062?
Check the references section above for vendor advisories and patch information. Affected products include: Dolibarr Dolibarr Erp\/Crm.