id: CVE-2020-9496 info: name: Apache OFBiz 17.12.03 - Cross-Site Scripting author: dwisiswant0 severity: medium description: Apache OFBiz 17.12.03 contains cross-site scripting and unsafe deserialization vulnerabilities via an XML-RPC request. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Apply the latest security patches or upgrade to a non-vulnerable version of Apache OFBiz. reference: - http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html - http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz - https://s.apache.org/l0994 - https://nvd.nist.gov/vuln/detail/CVE-2020-9496 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2020-9496 cwe-id: CWE-502 epss-score: 0.89561 epss-percentile: 0.98689 cpe: cpe:2.3:a:apache:ofbiz:17.12.03:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: ofbiz shodan-query: - http.html:"ofbiz" - ofbiz.visitor= fofa-query: - body="ofbiz" - app="apache_ofbiz" tags: cve,cve2020,ofbiz,packetstorm,apache,java http: - raw: - | POST /webtools/control/xmlrpc HTTP/1.1 Host: {{Hostname}} Origin: http://{{Hostname}} Content-Type: application/xml ProjectDiscoverydwisiswant0 matchers-condition: and matchers: - type: word part: body words: - "faultString" - "No such service [ProjectDiscovery]" - "methodResponse" condition: and - type: word part: header words: - "Content-Type: text/xml" - type: status status: - 200 # digest: 4a0a00473045022100c9e4cbbbf460e2cdc9e694471064bc5eea2702ed1ba888d53fbe7d39c34d319802204c0abc5eaf59fd7e3d442c0eea055c44b417aa0d4c7977923195dd4e940ddd30:922c64590222798bb761d5b6d8e72950