Cross-site Scripting (XSS) - Stored in dolibarr/dolibarr
Valid
Reported on
May 18th 2021
✍️ Description
The dolibarr
is vulnerable to XSS. It is possible to bypass the sanitizer through onpointerdown
event.
🕵️♂️ Proof of Concept
Payload: <a onpointerdown=alert(document.domain)>XSS</a>
.
- With an authenticated user, access
http://localhost/product/index.php
. - Click on
New product
in the left bar. - Put any content in the
Ref
andLabel
fields. - Put the payload in the description field.
- Click on
save
. - Click on
XSS
.
PoC video: https://www.youtube.com/watch?v=4ez3VRJd5oU.
💥 Impact
Arbitrary Javascript code execution.
to join this conversation