Page 4 of 21 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

IDOR vulnerability in the order processing feature from ecommerce component of Apache OFBiz before 17.12.04 Vulnerabilidad de IDOR en la funcionalidad order processing del componente ecommerce de Apache OFBiz versiones anteriores a 17.12.04 • https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5%40%3Ccommits.ofbiz.apache.org%3E https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d%40%3Ccommits.ofbiz.apache.org%3E https://lists.apache.org/thread.html/r2e669797c1ea08562253239d2dc4192d951945e0c36cb0754f5394a6%40%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rac7e36c3daa60dd4b813f72942921b4fad71da821480ebcea96ecea1%40%3Cnotifications.ofbiz.apache.org%3E https://s.apache.org/chokl • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 8.8EPSS: 0%CPEs: 18EXPL: 0

By manipulating the URL parameter externalLoginKey, a malicious, logged in user could pass valid Freemarker directives to the Template Engine that are reflected on the webpage; a specially crafted Freemarker template could be used for remote code execution. Mitigation: Upgrade to Apache OFBiz 16.11.01 Manipulando el parámetro de URL externalLoginKey, un usuario conectado malicioso podría pasar directivas Freemarker válidas que están reflejadas en la página web al motor de plantillas. Se podría utilizar utilizar una plantilla Freemarker especialmente manipulada para ejecutar código remotamente. Mitigación: Actualizar a Apache OFBiz 16.11.01. • http://git.net/ml/dev.ofbiz.apache.org/2016-11/msg00180.html • CWE-20: Improper Input Validation •

CVSS: 6.1EPSS: 0%CPEs: 18EXPL: 0

The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. • https://lists.apache.org/thread.html/28987cffe0237fa67eca9de8bbbc04a917ac8785342ad9e5a196c978%40%3Cuser.ofbiz.apache.org%3E https://s.apache.org/Owsz • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1) result or (2) error message. Múltiples vulnerabilidades de XSS en framework/common/webcommon/includes/messages.ftl en Apache OFBiz 11.04.01 anterior a 11.04.05 y 12.04.01 anterior a 12.04.04 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados, los cuales no se manejan debidamente en un mensaje de (1) resultado o (2) error. • http://ofbiz.apache.org/download.html#vulnerabilities http://packetstormsecurity.com/files/127929/Apache-OFBiz-11.04.04-12.04.03-Cross-Site-Scripting.html http://seclists.org/oss-sec/2014/q3/405 http://secunia.com/advisories/60807 http://svn.apache.org/viewvc?view=revision&revision=r1608698 http://www.securityfocus.com/archive/1/533163/100/0/threaded http://www.securityfocus.com/bid/69286 http://www.securitytracker.com/id/1030739 https://exchange.xforce.ibmcloud.com/vulnerabilities/9535 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

Apache Open For Business Project (aka OFBiz) 10.04.01 through 10.04.05, 11.04.01 through 11.04.02, and 12.04.01 allows remote attackers to execute arbitrary Unified Expression Language (UEL) functions via JUEL metacharacters in unspecified parameters, related to nested expressions. Apache Open For Business Project (también conocido como OFBiz) v10.04.01 hasta v10.04.05, v11.04.01 hasta v11.04.02, y v12.04.01 permite a atacantes remotos ejecutar funciones arbitrarias Unified Expression Language (UEL) a través de meta caracteres JUEL en parámetros no especificados, relacionado con expresiones anidadas. • http://archives.neohapsis.com/archives/bugtraq/2013-07/0143.html http://ofbiz.apache.org/download.html#vulnerabilities http://osvdb.org/95522 http://secunia.com/advisories/53910 http://www.securityfocus.com/bid/61369 https://exchange.xforce.ibmcloud.com/vulnerabilities/85875 • CWE-20: Improper Input Validation •