The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.
References
Link | Resource |
---|---|
https://s.apache.org/UO3W | Exploit Issue Tracking Third Party Advisory |
https://s.apache.org/UO3W | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://s.apache.org/UO3W - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2018-01-04 15:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-15714
Mitre link : CVE-2017-15714
CVE.ORG link : CVE-2017-15714
JSON object : View
Products Affected
apache
- ofbiz
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')