// For flags

CVE-2010-0432

Apache OFBiz - Admin Creator

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC (-)
Risk
CVSS Score
6.1 Medium
SSVC
-
KEV
-
EPSS
2.3%
Affected Products (-)
Vendors (1)
apache
Products (1)
ofbiz
Versions (1)
<= 09.04
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (13)
General (-)
Exploits & POcs (5)
exploit-db, bonsai-sec ...
Patches (-)
Advisories (8)
apache
Summary
Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in the Apache Open For Business Project (aka OFBiz) 09.04 and earlier, as used in Opentaps, Neogia, and Entente Oya, allow remote attackers to inject arbitrary web script or HTML via (1) the productStoreId parameter to control/exportProductListing, (2) the partyId parameter to partymgr/control/viewprofile (aka partymgr/control/login), (3) the start parameter to myportal/control/showPortalPage, (4) an invalid URI beginning with /facility/control/ReceiveReturn (aka /crmsfa/control/ReceiveReturn or /cms/control/ReceiveReturn), (5) the contentId parameter (aka the entityName variable) to ecommerce/control/ViewBlogArticle, (6) the entityName parameter to webtools/control/FindGeneric, or the (7) subject or (8) content parameter to an unspecified component under ecommerce/control/contactus.

Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Apache Open For Business Project (también conocido como OFBiz) v09.04 y anteriores, usado en Opentaps, Neogia, y Entente Oya, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de (1) el parámetro "productStoreId" a control/exportProductListing, (2) el parámetro "partyId" a partymgr/control/viewprofile (también conocido como partymgr/control/login), (3) el parámetro "start" a myportal/control/showPortalPage, (4) una URI no válida que comienza con /facility/control/ReceiveReturn (también conocido como /crmsfa/control/ReceiveReturn o /cms/control/ReceiveReturn), (5) el parámetro "contentId" (también conocido como variable entityName) a ecommerce/control/ViewBlogArticle, (6) el parámetro "entityName" a webtools/control/FindGeneric, o el (7) "subject" o (8) el parámetro "content" a un componente no especificado bajo ecommerce/control/contactus.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-01-27 CVE Reserved
  • 2010-04-15 CVE Published
  • 2010-04-16 First Exploit
  • 2024-09-16 CVE Updated
  • 2025-01-03 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
<= 09.04
Search vendor "Apache" for product "Ofbiz" and version " <= 09.04"
-
Affected