This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Dolibarr CMS allows **Remote Code Execution (RCE)** via PHP code injection. π **Consequences**: Attackers can bypass security restrictions by using uppercase tags (`<?PHP` instead of `<?php`).β¦
π‘οΈ **Root Cause**: **PHP Code Injection** due to case-insensitive handling of opening tags. The application fails to sanitize or strictly validate PHP tags, allowing malicious payloads to execute.β¦
π¦ **Affected**: **Dolibarr versions < 17.0.1**. Specifically, versions like 17.0.0 are vulnerable when the **CMS Website plugin** (core) is enabled.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: An authenticated user can execute arbitrary commands on the server. This grants **Remote Code Execution (RCE)**, potentially leading to full server takeover, data theft, or lateral movement.
Q5Is exploitation threshold high? (Auth/Config)
β οΈ **Threshold**: **Medium**. Requires **Authentication** (valid username/password). However, once logged in, exploitation is straightforward via the CMS plugin interface.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exploits**: **YES**. Multiple PoCs exist on GitHub (e.g., by Rubikcuv5, 04Shivam). Automated tools allow reverse shell generation easily. Wild exploitation is likely.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for Dolibarr instances running version < 17.0.1. Check if the **CMS Website plugin** is active. Look for PHP injection points in user-controllable fields where tag casing might be manipulated.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **YES**. The vulnerability was patched in **Dolibarr 17.0.1**. Upgrade to this version or later to resolve the issue.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: Disable the **CMS Website plugin** if not needed. Restrict access to Dolibarr strictly. Monitor for unusual PHP execution attempts. However, upgrading is the only true fix.
Q10Is it urgent? (Priority Suggestion)
π΄ **Priority**: **HIGH**. RCE vulnerabilities with public exploits are critical. Immediate patching to v17.0.1+ is required to prevent server compromise.