Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 10.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) label[libelle] parameter to the /htdocs/admin/dict.php?id=3 page; the (2) name[constname] parameter to the /htdocs/admin/const.php?mainmenu=home page; the (3) note[note] parameter to the /htdocs/admin/dict.php?id=10 page; the (4) zip[MAIN_INFO_SOCIETE_ZIP] or email[mail] parameter to the /htdocs/admin/company.php page; the (5) url[defaulturl], field[defaultkey], or value[defaultvalue] parameter to the /htdocs/admin/defaultvalues.php page; the (6) key[transkey] or key[transvalue] parameter to the /htdocs/admin/translation.php page; or the (7) [main_motd] or [main_home] parameter to the /htdocs/admin/ihm.php page.
References
Link Resource
https://github.com/tufangungor/tufangungor.github.io/blob/master/0days.md Exploit Third Party Advisory
https://tufangungor.github.io/0days Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-01-26T22:44:29

Updated: 2020-01-26T22:44:29

Reserved: 2020-01-26T00:00:00


Link: CVE-2020-7994

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-01-26T23:15:10.507

Modified: 2022-11-17T17:21:59.260


Link: CVE-2020-7994

JSON object: View

cve-icon Redhat Information

No data.

CWE