The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.
                
            References
                    | Link | Resource | 
|---|---|
| https://s.apache.org/UO3W | Exploit Issue Tracking Third Party Advisory | 
| https://s.apache.org/UO3W | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://s.apache.org/UO3W - Exploit, Issue Tracking, Third Party Advisory | 
Information
                Published : 2018-01-04 15:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-15714
Mitre link : CVE-2017-15714
CVE.ORG link : CVE-2017-15714
JSON object : View
Products Affected
                apache
- ofbiz
CWE
                
                    
                        
                        CWE-74
                        
            Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
