Overview
- Description
- The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.
- Source
- security@apache.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-74
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:ofbiz:16.11.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21851FFA-CEEF-48E4-8DF6-75A28009A481" }, { "criteria": "cpe:2.3:a:apache:ofbiz:16.11.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B4C50A5-8B45-4627-8D41-74E181A54B33" }, { "criteria": "cpe:2.3:a:apache:ofbiz:16.11.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BCB8B08-4BC5-487C-A706-A722BB5B430C" } ], "operator": "OR" } ] } ]