You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@ofbiz.apache.org by "Jacques Le Roux (Jira)" <ji...@apache.org> on 2022/02/27 12:35:00 UTC

[jira] [Created] (OFBIZ-12584) Stored XSS in webappPath parameter from content/control/EditWebSite

Jacques Le Roux created OFBIZ-12584:
---------------------------------------

             Summary: Stored XSS in webappPath parameter from content/control/EditWebSite
                 Key: OFBIZ-12584
                 URL: https://issues.apache.org/jira/browse/OFBIZ-12584
             Project: OFBiz
          Issue Type: Bug
          Components: content, framework/entity
    Affects Versions: 18.12.05
            Reporter: Jacques Le Roux
            Assignee: Jacques Le Roux


A user with rights to modify and/or create websites may insert malicious HTML elements in
the “webappPath” parameter from content/control/EditWebSite resulting in XSS.

In order to trigger the XSS a victim needs to navigate to main page of the modified website (eg webpos or ecommerce) and interact with the malicious HTML elements (eg trigger the “onmouseover” event by navigating with the mouse over the “form” and/or “a” tags).

Thanks to Matei "Mal" Badanoiu for reporting this post-auth vulnerabily



--
This message was sent by Atlassian Jira
(v8.20.1#820001)