// For flags

CVE-2016-6800

 

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC (-)
Risk
CVSS Score
6.1 Medium
SSVC
-
KEV
-
EPSS
0.1%
Affected Products (-)
Vendors (1)
apache
Products (1)
ofbiz
Versions (18)
11.04, 11.04.01, 11.04.02, 11.04.03, 11.04.04, 11.04.05, 11.04.06, 12.04, 12.04.01, 12.04.02, 12.04.03, 12.04.04, 12.04.05, 12.04.06, 13.07, 13.07.01, 13.07.02, 13.07.03
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (2)
General (1)
apache
Exploits & POcs (-)
Patches (-)
Advisories (1)
apache
Summary
Descriptions

The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01.

La configuración por defecto del framework Apache OFBiz ofrece una funcionalidad de blog. Diferentes usuarios son capaces de operar blogs relacionados con partes específicas. En el campo del formulario para la creación de nuevos artículos de blog, la entrada del usuario del campo de resumen, igual que el campo de artículo, no están correctamente saneadas. Es posible inyectar código JavaScript arbitrario en estos campos del formulario. Este código se ejecuta desde el navegador de cada usuario que visite el artículo. Mitigación: Se debe actualizar a Apache OFBiz 16.11.01.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-08-12 CVE Reserved
  • 2017-08-30 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
11.04
Search vendor "Apache" for product "Ofbiz" and version "11.04"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
11.04.01
Search vendor "Apache" for product "Ofbiz" and version "11.04.01"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
11.04.02
Search vendor "Apache" for product "Ofbiz" and version "11.04.02"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
11.04.03
Search vendor "Apache" for product "Ofbiz" and version "11.04.03"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
11.04.04
Search vendor "Apache" for product "Ofbiz" and version "11.04.04"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
11.04.05
Search vendor "Apache" for product "Ofbiz" and version "11.04.05"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
11.04.06
Search vendor "Apache" for product "Ofbiz" and version "11.04.06"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
12.04
Search vendor "Apache" for product "Ofbiz" and version "12.04"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
12.04.01
Search vendor "Apache" for product "Ofbiz" and version "12.04.01"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
12.04.02
Search vendor "Apache" for product "Ofbiz" and version "12.04.02"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
12.04.03
Search vendor "Apache" for product "Ofbiz" and version "12.04.03"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
12.04.04
Search vendor "Apache" for product "Ofbiz" and version "12.04.04"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
12.04.05
Search vendor "Apache" for product "Ofbiz" and version "12.04.05"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
12.04.06
Search vendor "Apache" for product "Ofbiz" and version "12.04.06"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
13.07
Search vendor "Apache" for product "Ofbiz" and version "13.07"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
13.07.01
Search vendor "Apache" for product "Ofbiz" and version "13.07.01"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
13.07.02
Search vendor "Apache" for product "Ofbiz" and version "13.07.02"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
13.07.03
Search vendor "Apache" for product "Ofbiz" and version "13.07.03"
-
Affected