First published: Mon Sep 16 2019(Updated: )
In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr Erp\/crm | =10.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16197 has a high severity due to the potential for Cross-Site Scripting (XSS) attacks.
To fix CVE-2019-16197, upgrade to a patched version of Dolibarr that addresses this vulnerability.
Users may be susceptible to XSS attacks that can compromise their web sessions and lead to data theft.
Yes, all users running Dolibarr version 10.0.1 are at risk from CVE-2019-16197.
CVE-2019-16197 was disclosed on 30th September 2019.