Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 3.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter in a setup action to admin/company.php, or the PATH_INFO to (2) admin/security_other.php, (3) admin/events.php, or (4) admin/user.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://doliforge.org/tracker/?func=detail&aid=232&group_id=144 | permissions required |
http://www.securityfocus.com/bid/50617 | vdb entry third party advisory broken link |
https://github.com/Dolibarr/dolibarr/commit/762f98ab4137749d0993612b4e3544a4207e78a1 | third party advisory patch |
http://archives.neohapsis.com/archives/bugtraq/2011-11/0138.html | third party advisory mailing list |
http://archives.neohapsis.com/archives/bugtraq/2011-11/0052.html | third party advisory mailing list |