CVE-2017-15714

The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.
References
Link Resource
https://s.apache.org/UO3W Exploit Issue Tracking Third Party Advisory
https://s.apache.org/UO3W Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:ofbiz:16.11.01:*:*:*:*:*:*:*
cpe:2.3:a:apache:ofbiz:16.11.02:*:*:*:*:*:*:*
cpe:2.3:a:apache:ofbiz:16.11.03:*:*:*:*:*:*:*

History

21 Nov 2024, 03:15

Type Values Removed Values Added
References () https://s.apache.org/UO3W - Exploit, Issue Tracking, Third Party Advisory () https://s.apache.org/UO3W - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2018-01-04 15:29

Updated : 2024-11-21 03:15


NVD link : CVE-2017-15714

Mitre link : CVE-2017-15714

CVE.ORG link : CVE-2017-15714


JSON object : View

Products Affected

apache

  • ofbiz
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')