First published: Thu Jan 03 2019(Updated: )
A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the "address" (POST) or "town" (POST) parameter to adherents/type.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr Erp\/crm | =8.0.2 | |
composer/dolibarr/dolibarr | <8.0.4 | 8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19992 has a moderate severity rating due to the potential for stored cross-site scripting attacks.
To address CVE-2018-19992, upgrade Dolibarr from version 8.0.2 to version 8.0.4 or later.
CVE-2018-19992 affects Dolibarr version 8.0.2 specifically.
CVE-2018-19992 can be exploited by remote authenticated users who can submit malicious inputs.
The vulnerable components in CVE-2018-19992 are the 'address' and 'town' parameters in adherents/type.php.