Dolibarr before 7.0.2 is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via the foruserlogin parameter to adherents/cartes/carte.php.
Remediation
Upgrade to Dolibarr version 7.0.2 or later to mitigate this vulnerability.
Details: CVE-2018-10095 matched at honey.scanme.sh
Protocol: HTTP
Full URL: https://honey.scanme.sh/dolibarr/adherents/cartes/carte.php?mode=cardlogin&foruserlogin=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&model=5160&optioncss=print
Timestamp: Tue Apr 30 13:42:05 +0000 UTC 2024
Source: https://cloud.projectdiscovery.io/vuln/6586cbfcd34f10dbba27c85437f584f7
Template Information
Request
Response
References:
CURL command
Generated by Nuclei v3.2.5