Vulnerability Details : CVE-2015-8685
Potential exploit
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.8.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) external calendar url or (2) the bank name field in the "import external calendar" page.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2015-8685
- cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8685
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8685
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2015-8685
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8685
-
https://github.com/Dolibarr/dolibarr/issues/4291
HTML Injection not filtered correctly · Issue #4291 · Dolibarr/dolibarr · GitHubExploit
-
http://packetstormsecurity.com/files/135256/dolibarr-HTML-Injection.html
dolibarr HTML Injection ≈ Packet Storm
-
https://github.com/GPCsolutions/dolibarr/commit/0d3181324c816bdf664ca5e1548dfe8eb05c54f8
FIX #2857, #4291 & #4341 Escape GETPOST alpha data by default · GPCsolutions/dolibarr@0d31813 · GitHub
-
http://seclists.org/fulldisclosure/2016/Jan/40
Full Disclosure: Html injection Dolibarr 3.8.3Exploit
Jump to