CVE-2020-13240

The DMS/ECM module in Dolibarr 11.0.4 allows users with the 'Setup documents directories' permission to rename uploaded files to have insecure file extensions. This bypasses the .noexe protection mechanism against XSS.
References
Link Resource
https://www.dubget.com/stored-xss-via-file-upload.html Exploit Third Party Advisory
https://www.dubget.com/stored-xss-via-file-upload.html Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dolibarr:dolibarr_erp\/crm:11.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 05:00

Type Values Removed Values Added
References () https://www.dubget.com/stored-xss-via-file-upload.html - Exploit, Third Party Advisory () https://www.dubget.com/stored-xss-via-file-upload.html - Exploit, Third Party Advisory

Information

Published : 2020-05-20 15:15

Updated : 2024-11-21 05:00


NVD link : CVE-2020-13240

Mitre link : CVE-2020-13240

CVE.ORG link : CVE-2020-13240


JSON object : View

Products Affected

dolibarr

  • dolibarr_erp\/crm
CWE
CWE-276

Incorrect Default Permissions

CWE-668

Exposure of Resource to Wrong Sphere