Exploit Report

Computer Security And Bug Information

CVE-2022-4933

CVECVE-2022-4933
CVE Title
Published Date2023-03-20T05:15Z
Modified Date2023-03-24T19:05Z
CWE TypeCWE-89
CVSS 3.xCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
DescriptionA vulnerability, which was classified as critical, has been found in ATM Consulting dolibarr_module_quicksupplierprice up to 1.1.6. Affected by this issue is the function upatePrice of the file script/interface.php. The manipulation leads to sql injection. The attack may be launched remotely. Upgrading to version 1.1.7 is able to address this issue. The name of the patch is ccad1e4282b0e393a32fcc852e82ec0e0af5446f. It is recommended to upgrade the affected component. VDB-223382 is the identifier assigned to this vulnerability.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://vuldb.com/?ctiid.223382
Reference DescriptionMISC https://vuldb.com/?ctiid.223382
Reference URLhttps://vuldb.com/?id.223382
Reference DescriptionMISC https://vuldb.com/?id.223382
Reference URLhttps://github.com/ATM-Consulting/dolibarr_module_quicksupplierprice/commit/ccad1e4282b0e393a32fcc852e82ec0e0af5446f
Reference DescriptionMISC https://github.com/ATM-Consulting/dolibarr_module_quicksupplierprice/commit/ccad1e4282b0e393a32fcc852e82ec0e0af5446f
Reference URLhttps://github.com/ATM-Consulting/dolibarr_module_quicksupplierprice/pull/21
Reference DescriptionMISC https://github.com/ATM-Consulting/dolibarr_module_quicksupplierprice/pull/21
TagsPermissions Required Third Party Advisory
Sources NIST MITRE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles