The DMS/ECM module in Dolibarr 11.0.4 allows users with the 'Setup documents directories' permission to rename uploaded files to have insecure file extensions. This bypasses the .noexe protection mechanism against XSS.
References
Link | Resource |
---|---|
https://www.dubget.com/stored-xss-via-file-upload.html | Exploit Third Party Advisory |
https://www.dubget.com/stored-xss-via-file-upload.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.dubget.com/stored-xss-via-file-upload.html - Exploit, Third Party Advisory |
Information
Published : 2020-05-20 15:15
Updated : 2024-11-21 05:00
NVD link : CVE-2020-13240
Mitre link : CVE-2020-13240
CVE.ORG link : CVE-2020-13240
JSON object : View
Products Affected
dolibarr
- dolibarr_erp\/crm