GHSA-4qq9-qg7j-fcm9

Suggest an improvement
Source
https://github.com/advisories/GHSA-4qq9-qg7j-fcm9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4qq9-qg7j-fcm9/GHSA-4qq9-qg7j-fcm9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4qq9-qg7j-fcm9
Aliases
  • CVE-2019-15062
Published
2022-05-24T16:53:44Z
Modified
2024-04-24T21:11:37.796145Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Dolibarr Cross-Site Request Forgery (CSRF)
Details

An issue was discovered in Dolibarr. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, because the attack is from one of the application's own settings pages, this mechanism is bypassed.)

Database specific
{
    "nvd_published_at": "2019-08-14T23:15:00Z",
    "cwe_ids": [
        "CWE-352"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-24T20:40:10Z"
}
References

Affected packages

Packagist / dolibarr/dolibarr

Package

Name
dolibarr/dolibarr
Purl
pkg:composer/dolibarr/dolibarr

Affected ranges

Type
ECOSYSTEM
Events
Introduced
10.0
Fixed
10.0.2

Affected versions

10.*

10.0.0
10.0.1