Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 3.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter in a setup action to admin/company.php, or the PATH_INFO to (2) admin/security_other.php, (3) admin/events.php, or (4) admin/user.php.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2011-11/0052.html | Third Party Advisory |
http://archives.neohapsis.com/archives/bugtraq/2011-11/0138.html | Third Party Advisory |
http://www.securityfocus.com/bid/50617 | Broken Link Third Party Advisory VDB Entry |
https://doliforge.org/tracker/?func=detail&aid=232&group_id=144 | Permissions Required |
https://github.com/Dolibarr/dolibarr/commit/762f98ab4137749d0993612b4e3544a4207e78a1 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2011-11-28T11:00:00
Updated: 2012-02-17T10:00:00
Reserved: 2011-11-04T00:00:00
Link: CVE-2011-4329
JSON object: View
NVD Information
Status : Analyzed
Published: 2011-11-28T11:55:09.970
Modified: 2023-02-10T16:51:26.480
Link: CVE-2011-4329
JSON object: View
Redhat Information
No data.
CWE