32 results (0.009 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A Cross Site Scripting (XSS) vulnerability exists in Dolibarr before 14.0.3 via the ticket creation flow. Exploitation requires that an admin copies the payload into a box. Se presenta una vulnerabilidad de tipo Cross Site Scripting (XSS) en Dolibarr versiones anteriores a 14.0.3, por medio del flujo de creación de tickets. La explotación requiere que un administrador copie la carga útil en una caja • https://packetstormsecurity.com/files/164544/Dolibarr-ERP-CRM-14.0.2-Cross-Site-Scripting-Privilege-Escalation.html https://truedigitalsecurity.com/advisory-summary-2021 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name. En la aplicación "Dolibarr", versiones v3.3.beta1_20121221 a v13.0.2, los usuarios de nivel de administrador presentan acceso a la función "Modify" para cambiar los datos de otros usuarios, pero no comprueba el nombre de "Login" ya existente, mientras cambia el nombre del usuario "Login". Esto conlleva a una toma de posesión completa de la cuenta del usuario víctima. • https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956 • CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password. En la aplicación "Dolibarr", versiones v2.8.1 a v13.0.2, son vulnerables a la toma de cuenta por medio de la funcionalidad password reset. Un atacante poco privilegiado puede restablecer la contraseña de cualquier usuario de la aplicación usando el enlace de restablecimiento de contraseña que el usuario recibió mediante correo electrónico cuando se le solicitó una contraseña olvidada. • https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation. • https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint. En la aplicación Dolibarr, versiones 2.8.1 hasta 13.0.4, no se restringe o se restringe incorrectamente el acceso a un recurso de un actor no autorizado. Un atacante poco privilegiado puede modificar la Nota Privada que sólo un administrador tiene derechos para hacer, el campo afectado se encuentra en el endpoint "/adherents/note.php? • https://github.com/Dolibarr/dolibarr/commit/8cc100012d46282799fb19f735a53b7101569377 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954 • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •