2021-01-02 04:56:15 +00:00
id : CVE-2020-9496
2020-08-16 00:52:06 +00:00
info :
2022-09-08 13:28:46 +00:00
name : Apache OFBiz 17.12.03 - Cross-Site Scripting
2020-08-16 00:52:06 +00:00
author : dwisiswant0
severity : medium
2022-09-08 13:28:46 +00:00
description : Apache OFBiz 17.12.03 contains cross-site scripting and unsafe deserialization vulnerabilities via an XML-RPC request.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:22:36 +00:00
remediation : |
Apply the latest security patches or upgrade to a non-vulnerable version of Apache OFBiz.
2021-03-15 17:14:52 +00:00
reference :
- http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html
- http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html
2021-08-19 13:15:35 +00:00
- https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz
2022-05-17 09:18:12 +00:00
- https://s.apache.org/l0994
2022-09-08 13:28:46 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-9496
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-9496
2023-07-11 19:49:27 +00:00
cwe-id : CWE-502
2024-04-08 11:34:33 +00:00
epss-score : 0.89561
epss-percentile : 0.98689
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:apache:ofbiz:17.12.03:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : apache
product : ofbiz
2024-06-07 10:04:29 +00:00
shodan-query :
- http.html:"ofbiz"
- ofbiz.visitor=
fofa-query :
- body="ofbiz"
- app="apache_ofbiz"
2024-01-14 09:21:50 +00:00
tags : cve,cve2020,ofbiz,packetstorm,apache,java
2020-08-16 00:52:06 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-08-16 00:52:06 +00:00
- raw :
- |
POST /webtools/control/xmlrpc HTTP/1.1
Host : {{Hostname}}
2020-08-16 01:14:03 +00:00
Origin : http://{{Hostname}}
Content-Type : application/xml
<?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
2020-08-16 00:52:06 +00:00
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2020-08-16 00:52:06 +00:00
words :
- "faultString"
- "No such service [ProjectDiscovery]"
- "methodResponse"
condition : and
2023-07-11 19:49:27 +00:00
2020-08-16 00:52:06 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2020-08-16 00:52:06 +00:00
words :
- "Content-Type: text/xml"
2023-07-11 19:49:27 +00:00
2020-08-16 00:52:06 +00:00
- type : status
status :
2020-08-25 22:52:00 +00:00
- 200
2024-06-08 16:02:17 +00:00
# digest: 4a0a00473045022100c9e4cbbbf460e2cdc9e694471064bc5eea2702ed1ba888d53fbe7d39c34d319802204c0abc5eaf59fd7e3d442c0eea055c44b417aa0d4c7977923195dd4e940ddd30:922c64590222798bb761d5b6d8e72950