An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, because the attack is from one of the application's own settings pages, this mechanism is bypassed.)
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2431 An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, because the attack is from one of the application's own settings pages, this mechanism is bypassed.)
Github GHSA Github GHSA GHSA-4qq9-qg7j-fcm9 Dolibarr Cross-Site Request Forgery (CSRF)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T00:34:53.128Z

Reserved: 2019-08-14T00:00:00

Link: CVE-2019-15062

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-08-14T23:15:10.437

Modified: 2024-11-21T04:27:58.723

Link: CVE-2019-15062

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.