The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.
References
Link | Resource |
---|---|
https://s.apache.org/UO3W | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-01-04 07:29
Updated : 2018-01-24 11:03
NVD link : CVE-2017-15714
Mitre link : CVE-2017-15714
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
apache
- ofbiz