2024-05-25 21:48:12 +02:00
|
|
|
### [CVE-2023-30253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30253)
|
|
|
|

|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
### Description
|
|
|
|
|
|
|
|
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
|
|
|
|
|
|
|
|
### POC
|
|
|
|
|
|
|
|
#### Reference
|
|
|
|
- https://www.swascan.com/security-advisory-dolibarr-17-0-0/
|
2024-06-09 00:33:16 +00:00
|
|
|
- https://www.swascan.com/security-advisory-dolibarr-17-0-0/
|
2024-05-25 21:48:12 +02:00
|
|
|
|
|
|
|
#### Github
|
2024-05-28 08:49:17 +00:00
|
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
2024-05-25 21:48:12 +02:00
|
|
|
|