32 results (0.009 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

15 Dec 2021 — A Cross Site Scripting (XSS) vulnerability exists in Dolibarr before 14.0.3 via the ticket creation flow. Exploitation requires that an admin copies the payload into a box. Se presenta una vulnerabilidad de tipo Cross Site Scripting (XSS) en Dolibarr versiones anteriores a 14.0.3, por medio del flujo de creación de tickets. La explotación requiere que un administrador copie la carga útil en una caja • https://packetstormsecurity.com/files/164544/Dolibarr-ERP-CRM-14.0.2-Cross-Site-Scripting-Privilege-Escalation.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

17 Aug 2021 — In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name. En la aplicación "Dolibarr", versiones v3.3.beta1_20121221 a v13.0.2, los usuarios de nivel de administrador presentan acceso a la funci... • https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee • CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

17 Aug 2021 — In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password. En la aplicación "Dolibarr", versiones v2.8.1 a v13.0.2, son vulnerables a la toma de cuenta por medio de la funcionalidad password reset. Un atacante poco privilegiado puede restablecer la contraseña de cualquier u... • https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2021 — In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, whic... • https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

09 Aug 2021 — In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint. En la aplicación Dolibarr, versiones 2.8.1 hasta 13.0.4, no se restringe o se restringe incorrectamente el acceso a un recurso de un actor no autorizado. Un atacante poco privilegiado puede modificar la Nota Privada qu... • https://github.com/Dolibarr/dolibarr/commit/8cc100012d46282799fb19f735a53b7101569377 • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 3

02 Sep 2020 — Dolibarr before 11.0.5 allows low-privilege users to upload files of dangerous types, leading to arbitrary code execution. This occurs because .pht and .phar files can be uploaded. Also, a .htaccess file can be uploaded to reconfigure access control (e.g., to let .noexe files be executed as PHP code to defeat the .noexe protection mechanism). Dolibarr versiones anteriores a 11.0.5, permite a usuarios pocos privilegiados cargar archivos de tipos peligrosos, conllevando a una ejecución de código arbitraria.&#... • https://packetstorm.news/files/id/161955 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

21 Aug 2020 — Dolibarr CRM before 11.0.5 allows privilege escalation. This could allow remote authenticated attackers to upload arbitrary files via societe/document.php in which "disabled" is changed to "enabled" in the HTML source code. Dolibarr CRM versiones anteriores a 11.0.5, permite una escalada de privilegios. Esto podría permitir a atacantes autenticados remotos cargar archivos arbitrarios por medio del archivo societe/document.php en los que "disabled" es cambiado a "enabled" en el código fuente HTML. • https://github.com/Dolibarr/dolibarr/blob/develop/ChangeLog •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

18 Jun 2020 — A SQL injection vulnerability in accountancy/customer/card.php in Dolibarr 11.0.3 allows remote authenticated users to execute arbitrary SQL commands via the id parameter. Una vulnerabilidad de inyección SQL en el archivo accountancy/customer/card.php en Dolibarr versión 11.0.3, permite a usuarios autenticados remotos ejecutar comandos SQL arbitrarios por medio del parámetro id • https://github.com/Dolibarr/dolibarr/commit/40e16672e3aa4e9208ea7a4829f30507dcdfc4ba • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 3

18 May 2020 — Dolibarr before 11.0.4 allows XSS. Dolibarr versiones anteriores a 11.0.4, permite un ataque de tipo XSS. Dolibarr version 11.0.3 suffers from a cross site scripting vulnerability. • https://packetstorm.news/files/id/157752 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

06 May 2020 — core/get_menudiv.php in Dolibarr before 11.0.4 allows remote authenticated attackers to bypass intended access restrictions via a non-alphanumeric menu parameter. El archivo core/get_menudiv.php en Dolibarr versiones anteriores a 1.0.4, permite a atacantes autenticados remotos omitir restricciones de acceso previstas por medio de un parámetro de menú no alfanumérico. • https://github.com/Dolibarr/dolibarr/commit/c1b530f58f6f01081ddbeaa2092ef308c3ec2727 • CWE-20: Improper Input Validation •