The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.
                
            References
                    | Link | Resource | 
|---|---|
| https://s.apache.org/UO3W | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2018-01-04 07:29
Updated : 2018-01-24 11:03
NVD link : CVE-2017-15714
Mitre link : CVE-2017-15714
JSON object : View
CWE
                
                    
                        
                        CWE-74
                        
            Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
                apache
- ofbiz
 


