A vulnerability has been discovered in Dolibarr, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'idmenu' parameter to '/externalsite/frames.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Two vulnerabilities have been found in in Dolibarr ERP/CRM, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed via the "idmenu" GET parameter to externalsite/frames.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Successful exploitation of this vulnerability requires the "External site" module within the "Other" section to be enabled (disabled by default).
2) Input passed via the "mode" GET parameter to admin/modules.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Disclosure Timeline:
Published: Oct 19 2012 12:00AM
Updated: Oct 19 2012 12:00AM