Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server.
References
Link | Resource |
---|---|
https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-29T15:40:53
Updated: 2019-07-29T15:40:53
Reserved: 2019-04-11T00:00:00
Link: CVE-2019-11201
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-29T16:15:11.413
Modified: 2019-08-05T18:00:46.507
Link: CVE-2019-11201
JSON object: View
Redhat Information
No data.
CWE