You are here

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

April 17, 2012 - 8:00am

Addthis

PROBLEM:

Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

PLATFORM:

Apache OFBiz 10.x

ABSTRACT:

The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected.

references LINKS:

Vendor Advisory
Secunia Advisory 48800
CVE-2012-1621

IMPACT ASSESSMENT:

High

Discussion:

1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

2) Certain input passed as parameter arrays is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

3) Certain input related to content IDs and map-keys is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

4) Certain unspecified input passed to the Webslinger component is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

5) An error in the FlexibleStringExpander class when handling strings with nested scripts can be exploited to execute arbitrary code.

Impact:

Cross Site Scripting
System access
From remote

Solution:

Update to version 10.04.02. Newest version avaliable at ofbiz.apache.org

 

Addthis