Miggo Logo

CVE-2018-19799: Dolibarr ERP and CRM contain XSS Vulnerability

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.85898%
Published
5/14/2022
Updated
7/25/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
dolibarr/dolibarrcomposer<= 8.0.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in exports/export.php through the 'datatoexport' parameter. While the exact function name isn't specified in available sources, the core issue is the unsanitized reflection of this parameter in HTML output. The PoC demonstrates direct parameter injection in the URL, and XSS vulnerabilities typically occur when untrusted input is rendered without escaping. The file path and parameter name are explicitly referenced in all vulnerability reports, making this identification conclusive despite the lack of specific function names.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*oli**rr *RP/*RM t*rou** *.*.* **s `/*xports/*xport.p*p?**t*to*xport=` XSS.

Reasoning

T** vuln*r**ility m*ni**sts in `*xports/*xport.p*p` t*rou** t** '**t*to*xport' p*r*m*t*r. W*il* t** *x**t *un*tion n*m* isn't sp**i*i** in *v*il**l* sour**s, t** *or* issu* is t** uns*nitiz** r**l**tion o* t*is p*r*m*t*r in *TML output. T** Po* **mon