Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1010054 PoC — Dolibarr ERP/CRM 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:Dolibarr ERP/CRM 跨站请求伪造漏洞 (CVE-2019-1010054)
Description:Dolibarr ERP/CRM是法国Dolibarr基金会的一套基于Web的企业资源计划(ERP)和客户关系管理(CRM)系统。该系统可用来管理产品、库存、发票、订单等。 Dolibarr ERP/CRM 7.0.0版本中存在跨站请求伪造漏洞。远程攻击者可借助恶意的HTML利用该漏洞更改用户密码,删除用户并关闭密码加密功能。
Description
Reproduction of CSRF breach CVE-2019-1010054
Readme
# Security breach project - Cross Site Request Forgery

Dolibarr 7.0.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: allow malitious html to change user password, disable users and disable password encryptation. The component is: Function User password change, user disable and password encryptation. The attack vector is: admin access malicious urls.


## Demonstration

## Demonstration steps

-launch: 'vagrant up' to download the environment (naturally takes some time : up to a couple of hours -it's vagrant whatchu gonna do  ¯\_(ツ)_/¯).

-Once the environment is ready, launch the following commands from dev directory :

```bash
rm index.html
mv backup_index.html index.html
```

-launch 

```bash
vagrant ssh
```
-follow the rest of steps in the report


## Good to know


-The report is in French, it describes measures which could limit this type of breach, it also gives a detailed analysis of the breach and a detailed walk-through of what you should do in order to reproduce the breach. 
File Snapshot

[4.0K] /data/pocs/9b6e2a6b9f8a298cb089a99944c6a08197aee52e ├── [4.0K] dev │   ├── [ 497] backup_index.html │   ├── [4.0K] exploit │   │   ├── [ 603] change.html │   │   ├── [ 615] delete.html │   │   └── [ 513] disable.html │   └── [ 497] index.html ├── [525K] rapport2.pdf ├── [1.0K] README.md └── [3.2K] Vagrantfile 2 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.