Hello,

This vulnerability was already send to us , I created a bug about it. And this one is already fix into 3.5 branch.

https://doliforge.org/tracker/?func=detail&aid=1437&atid=246&group_id=144
https://github.com/Dolibarr/dolibarr/pull/1645

Deepak Rathore send us the information, but as I made some fix, but not all, he publish the issues. That the normal process.

After that read what the exploit is : entity is not escaped and produce a SQL error message, and they says it can be a source of SQL injection... I understand the concept but, in this case, you can't have any SQL injection with sql request like "WHERE entity IN (0,".$entity)". Put what you want here, it will never produce a SQL injection of malicius data, at least is will give you an error message and th'at the case. Or If you know a way to really use this exploit please let me know, I want to learn how to hack application with this kind of exploit. There is tha same issue with sort order and sort field send by query string into list. It give an SQL error but if somebody can explain to me how insert or read data of a database just by hacking the "ORDER BY " instruction, you'll maka my day.

Regards


Florian Henry
+33 6 03 76 48 07
florian.he...@open-concept.pro
http://www.open-concept.pro
Twitter : @_Open_Concept_

Le 08/07/2014 15:24, Maxime Kohlhaas a écrit :
Hi all,

Apparently we have some fix to do on 3.5 :

http://www.exploit-db.com/exploits/34007/

Don't know if anyone saw this because i haven't seen anything on this mailist about this issue.

Regards,

--
/*Maxime Kohlhaas
*Consultant associé
//ATM Consulting/
/+33 6 33 42 92 43/


_______________________________________________
Dolibarr-dev mailing list
Dolibarr-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/dolibarr-dev

_______________________________________________
Dolibarr-dev mailing list
Dolibarr-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/dolibarr-dev

Répondre à