First published: Thu Jan 03 2019(Updated: )
A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the "address" (POST) or "town" (POST) parameter to user/card.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr Erp\/crm | =8.0.2 | |
composer/dolibarr/dolibarr | <8.0.4 | 8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19995 has a medium severity rating due to the potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2018-19995, upgrade Dolibarr to version 8.0.4 or later.
CVE-2018-19995 affects authenticated users of Dolibarr version 8.0.2 and below.
The implications of CVE-2018-19995 include the potential for attackers to inject arbitrary web scripts or HTML into user profiles.
CVE-2018-19995 involves the "address" and "town" parameters in the user/card.php file.