In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-09-16 13:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16197
Mitre link : CVE-2019-16197
CVE.ORG link : CVE-2019-16197
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')