Description
Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4446 | Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server. |
Github GHSA |
GHSA-jwg3-v9xm-v6q9 | Dolibarr ERP and CRM Code Injection |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:48:08.756Z
Reserved: 2019-04-11T00:00:00.000Z
Link: CVE-2019-11201
No data.
Status : Modified
Published: 2019-07-29T16:15:11.413
Modified: 2024-11-21T04:20:42.907
Link: CVE-2019-11201
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA