The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape user input property passed. This allows for code injection by passing that code through the URL. For example by appending this code "__format=%27;alert(%27xss%27)" to the URL an alert window would execute.
References
Link Resource
https://s.apache.org/UO3W Exploit Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: apache

Published: 2018-01-03T00:00:00

Updated: 2018-01-04T14:57:01

Reserved: 2017-10-21T00:00:00


Link: CVE-2017-15714

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-01-04T15:29:00.210

Modified: 2018-01-24T19:03:21.660


Link: CVE-2017-15714

JSON object: View

cve-icon Redhat Information

No data.

CWE