A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the "address" (POST) or "town" (POST) parameter to adherents/type.php.
References
Link | Resource |
---|---|
https://github.com/Dolibarr/dolibarr/commit/0f06e39d23636bd1e4039ac61a743c79725c798b | Patch Third Party Advisory |
https://github.com/Dolibarr/dolibarr/commit/0f06e39d23636bd1e4039ac61a743c79725c798b | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Dolibarr/dolibarr/commit/0f06e39d23636bd1e4039ac61a743c79725c798b - Patch, Third Party Advisory |
Information
Published : 2019-01-03 19:29
Updated : 2024-11-21 03:58
NVD link : CVE-2018-19992
Mitre link : CVE-2018-19992
CVE.ORG link : CVE-2018-19992
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')