// For flags

CVE-2017-15714

 

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC (-)
Risk
CVSS Score
9.8 Critical
SSVC
-
KEV
-
EPSS
0.4%
Affected Products (-)
Vendors (1)
apache
Products (1)
ofbiz
Versions (3)
16.11.01, 16.11.02, 16.11.03
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (1)
General (-)
Exploits & POcs (1)
apache
Patches (-)
Advisories (-)
Summary
Descriptions

The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.

El plugin BIRT en Apache OFBiz de la versión 16.11.01 a la 16.11.03 no escapa la propiedad de la entrada de usuario pasada. Esto permite que se inyecte código pasando ese código a través de una URL. Por ejemplo, adjuntando este código "__format=%27;alert(%27xss%27)" a la URL se ejecuta una ventana de alerta.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-10-21 CVE Reserved
  • 2018-01-04 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-16 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

References (1)
URL Tag Source
URL Date SRC
https://s.apache.org/UO3W 2024-09-16
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
16.11.01
Search vendor "Apache" for product "Ofbiz" and version "16.11.01"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
16.11.02
Search vendor "Apache" for product "Ofbiz" and version "16.11.02"
-
Affected
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
16.11.03
Search vendor "Apache" for product "Ofbiz" and version "16.11.03"
-
Affected