Page 4 of 126 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

10 Jan 2022 — Improper Validation of Specified Quantity in Input vulnerability in dolibarr dolibarr/dolibarr. dolibarr es vulnerable a Errores de Lógica de Negocio • https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32 • CWE-1284: Improper Validation of Specified Quantity in Input •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 2

01 Jan 2022 — admin/limits.php in Dolibarr 7.0.2 allows HTML injection, as demonstrated by the MAIN_MAX_DECIMALS_TOT parameter. El archivo admin/limits.php en Dolibarr versión 7.0.2, permite una inyección de HTML, como lo demuestra el parámetro MAIN_MAX_DECIMALS_TOT. • https://github.com/Dolibarr/dolibarr/issues/20237 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

15 Dec 2021 — A Cross Site Scripting (XSS) vulnerability exists in Dolibarr before 14.0.3 via the ticket creation flow. Exploitation requires that an admin copies the payload into a box. Se presenta una vulnerabilidad de tipo Cross Site Scripting (XSS) en Dolibarr versiones anteriores a 14.0.3, por medio del flujo de creación de tickets. La explotación requiere que un administrador copie la carga útil en una caja • https://packetstormsecurity.com/files/164544/Dolibarr-ERP-CRM-14.0.2-Cross-Site-Scripting-Privilege-Escalation.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 2%CPEs: 1EXPL: 3

10 Nov 2021 — Dolibarr ERP and CRM 13.0.2 allows XSS via object details, as demonstrated by > and < characters in the onpointermove attribute of a BODY element to the user-management feature. Dolibarr ERP y CRM versión 13.0.2, permite un ataque de tipo XSS por medio de detalles de objetos, como es demostrado por los caracteres ) y ( en el atributo onpointermove de un elemento BODY de la función de administración de usuarios Dolibarr ERP and CRM version 13.0.2 suffer from a persistent cross site scripting vulnerability. • https://packetstorm.news/files/id/164922 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 4

10 Nov 2021 — The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked. El módulo de creación de sitios web en Dolibarr versión 13.0.2, permite una ejecución de código remota PHP debido a un mecanismo de protección incompleto en el que system, exec y shell_exec están bloqueados pero los backticks no lo están Dolibarr ERP and CRM version 13.0.2 suffer from a remote code execut... • https://packetstorm.news/files/id/164923 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

17 Aug 2021 — In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name. En la aplicación "Dolibarr", versiones v3.3.beta1_20121221 a v13.0.2, los usuarios de nivel de administrador presentan acceso a la funci... • https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee • CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

17 Aug 2021 — In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password. En la aplicación "Dolibarr", versiones v2.8.1 a v13.0.2, son vulnerables a la toma de cuenta por medio de la funcionalidad password reset. Un atacante poco privilegiado puede restablecer la contraseña de cualquier u... • https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2021 — In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, whic... • https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

09 Aug 2021 — In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint. En la aplicación Dolibarr, versiones 2.8.1 hasta 13.0.4, no se restringe o se restringe incorrectamente el acceso a un recurso de un actor no autorizado. Un atacante poco privilegiado puede modificar la Nota Privada qu... • https://github.com/Dolibarr/dolibarr/commit/8cc100012d46282799fb19f735a53b7101569377 • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •

CVSS: 9.0EPSS: 8%CPEs: 1EXPL: 1

23 Dec 2020 — Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php. Dolibarr versión 12.0.3, es vulnerable a una Ejecución de Código Remota autenticada. Un atacante que tenga acceso al panel de administración puede manipular la función de copia de seguridad al insertar una carga útil en el nombre de ar... • http://bilishim.com/2020/12/18/zero-hunting-2.html • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •