Dismissed
Permalink
CVE-2020-36966
6.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse dismissed
Dolibarr 11.0.3 - 'ldap.php' - Persistent Cross-Site Scripting
Dolibarr 11.0.3 contains a persistent cross-site scripting vulnerability in LDAP synchronization settings that allows attackers to inject malicious scripts through multiple parameters. Attackers can exploit the host, slave, and port parameters in /dolibarr/admin/ldap.php to execute arbitrary JavaScript and potentially steal user cookie information.
References
- ExploitDB-48504 exploit
- Official Dolibarr Product Homepage product
- VulnCheck Advisory: Dolibarr 11.0.3 - 'ldap.php' - Persistent Cross-Site Scripting third-party-advisory
Affected products
Dolibarr
- =<11.0.3
Matching in nixpkgs
Package maintainers
-
@GaetanLepage Gaetan Lepage <gaetan@glepage.com>