Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 10.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) label[libelle] parameter to the /htdocs/admin/dict.php?id=3 page; the (2) name[constname] parameter to the /htdocs/admin/const.php?mainmenu=home page; the (3) note[note] parameter to the /htdocs/admin/dict.php?id=10 page; the (4) zip[MAIN_INFO_SOCIETE_ZIP] or email[mail] parameter to the /htdocs/admin/company.php page; the (5) url[defaulturl], field[defaultkey], or value[defaultvalue] parameter to the /htdocs/admin/defaultvalues.php page; the (6) key[transkey] or key[transvalue] parameter to the /htdocs/admin/translation.php page; or the (7) [main_motd] or [main_home] parameter to the /htdocs/admin/ihm.php page.
References
Link | Resource |
---|---|
https://tufangungor.github.io/0days | Exploit Third Party Advisory |
https://github.com/tufangungor/tufangungor.github.io/blob/master/0days.md | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-01-26 15:15
Updated : 2022-11-17 09:21
NVD link : CVE-2020-7994
Mitre link : CVE-2020-7994
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
dolibarr
- dolibarr_erp\/crm