###################################################################### # Exploit Title: XSS on dolibarr 3.8.3 # Date: 03/01/2016 # Author: Mickael Dorigny @ Synetis # Vendor or Software Link: http://www.dolibarr.org/ # Category: XSS ###################################################################### Dolibarr description : ====================================================================== Dolibarr ERP & CRM is a modern and easy to use web software to manage your business (contacts, invoices, orders, products, stocks, agenda, emailings, etc...). It's opensource and free software designed for small companies, foundations and freelances. You can install and use it as a standalone application, or online on a mutualized or dedicated server to use it from anywhere. Dolibarr is also available on ready to use Cloud services. Vulnerability description : ====================================================================== A Stored XSS is available in the Dolibarr 3.8.3 core code. No module needs to be activated to exploit this XSS vulnerability because an attacker can use the user attributes management to do it. This XSS can be exploited through a basic user account on the dolibarr installation. Impacted users are administrators and users that have right to check other user's attributes. PoC n°1 : Stored XSS in user attributes: ==================================== Once a simple user is connected with his account, he can modifiy his attributes like Last name, First name, Mobile number, etc.. These informations can be reviewed by other users who have administration privileges. Note that some basic protection are present just after form submitting. These protection doesn't allow attacker to use basic JavaScript tips like "