Dolibarr ERP/CRM 9.0.1 was affected by stored XSS within uploaded files. These vulnerabilities allowed the execution of a JavaScript payload each time any regular user or administrative user clicked on the malicious link hosted on the same domain. The vulnerabilities could be exploited by low privileged users to target administrators. The viewimage.php page did not perform any contextual output encoding and would display the content within the uploaded file with a user-requested MIME type.
References
Link | Resource |
---|---|
https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities | Exploit Third Party Advisory |
https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities - Exploit, Third Party Advisory |
Information
Published : 2019-07-29 16:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11199
Mitre link : CVE-2019-11199
CVE.ORG link : CVE-2019-11199
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')