GHSA-gjg7-qfvp-9hm4

Suggest an improvement
Source
https://github.com/advisories/GHSA-gjg7-qfvp-9hm4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-gjg7-qfvp-9hm4/GHSA-gjg7-qfvp-9hm4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gjg7-qfvp-9hm4
Aliases
Published
2022-11-21T06:30:29Z
Modified
2025-04-03T15:26:48.673552Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
SQL injection in Dolibarr
Details

SQL injection attacks can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period. This affect 16.0.1 and 16.0.2 only. 16.0.0 or lower, and 16.0.3 or higher are not affected

Database specific
{
    "cwe_ids": [
        "CWE-89"
    ],
    "severity": "CRITICAL",
    "github_reviewed_at": "2022-11-21T23:57:34Z",
    "github_reviewed": true,
    "nvd_published_at": "2022-11-21T05:15:00Z"
}
References

Affected packages

Packagist / dolibarr/dolibarr

Package

Name
dolibarr/dolibarr
Purl
pkg:composer/dolibarr/dolibarr

Affected ranges

Type
ECOSYSTEM
Events
Introduced
16.0.1
Fixed
16.0.3