First published: Sun Jan 26 2020(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 10.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) label[libelle] parameter to the /htdocs/admin/dict.php?id=3 page; the (2) name[constname] parameter to the /htdocs/admin/const.php?mainmenu=home page; the (3) note[note] parameter to the /htdocs/admin/dict.php?id=10 page; the (4) zip[MAIN_INFO_SOCIETE_ZIP] or email[mail] parameter to the /htdocs/admin/company.php page; the (5) url[defaulturl], field[defaultkey], or value[defaultvalue] parameter to the /htdocs/admin/defaultvalues.php page; the (6) key[transkey] or key[transvalue] parameter to the /htdocs/admin/translation.php page; or the (7) [main_motd] or [main_home] parameter to the /htdocs/admin/ihm.php page.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr Erp\/crm | =10.0.6 | |
composer/dolibarr/dolibarr | =10.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-7994 is medium with a CVSS score of 6.1.
Remote attackers can exploit CVE-2020-7994 by injecting arbitrary web script or HTML through specific parameters in Dolibarr 10.0.6.
Dolibarr 10.0.6 is the affected version by CVE-2020-7994.
The CWE ID associated with CVE-2020-7994 is CWE-79.
Yes, you can find more information about CVE-2020-7994 in the following references: [link 1](https://github.com/tufangungor/tufangungor.github.io/blob/master/0days.md) and [link 2](https://tufangungor.github.io/0days).