Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 3.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter in a setup action to admin/company.php, or the PATH_INFO to (2) admin/security_other.php, (3) admin/events.php, or (4) admin/user.php.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2011-11/0052.html | Third Party Advisory |
https://github.com/Dolibarr/dolibarr/commit/762f98ab4137749d0993612b4e3544a4207e78a1 | Patch Third Party Advisory |
https://doliforge.org/tracker/?func=detail&aid=232&group_id=144 | Permissions Required |
http://archives.neohapsis.com/archives/bugtraq/2011-11/0138.html | Third Party Advisory |
http://www.securityfocus.com/bid/50617 | Broken Link Third Party Advisory VDB Entry |
Configurations
Information
Published : 2011-11-28 03:55
Updated : 2023-02-10 08:51
NVD link : CVE-2011-4329
Mitre link : CVE-2011-4329
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
dolibarr
- dolibarr_erp\/crm