[jira] [Commented] (OFBIZ-12254) XSS vulnerability for ListWorkEfforts form

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[jira] [Commented] (OFBIZ-12254) XSS vulnerability for ListWorkEfforts form

Nicolas Malin (Jira)

    [ https://issues.apache.org/jira/browse/OFBIZ-12254?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17359929#comment-17359929 ]

ASF subversion and git services commented on OFBIZ-12254:
---------------------------------------------------------

Commit 725c8543e0df45c011a0c645b0a57ce9a42fa61d in ofbiz-framework's branch refs/heads/release17.12 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=725c854 ]

Fixed: XSS vulnerability for ListWorkEfforts form (OFBIZ-12254)
If `sanitizer.enable` is turned off, `ListWorkEfforts` form will be vulnerable
to XSS attack, because of incomplete escaping.

Steps to reproduce:

1. Turn off `sanitizer.enable` in owasp.properties
2. Create a WorkEffort entity with name as `<script>alert(1)</script>`
3. Go to page: http://localhost:8080/workeffort/control/FindWorkEffort
4. Search for "Work Effort Name" which contains "script"

Thanks: Xin Wang


> XSS vulnerability for ListWorkEfforts form
> ------------------------------------------
>
>                 Key: OFBIZ-12254
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-12254
>             Project: OFBiz
>          Issue Type: Bug
>    Affects Versions: Trunk
>            Reporter: Xin Wang
>            Priority: Major
>         Attachments: 0001-Fixed-Escaping-description-text-for-hyperlink-OFBIZ-.patch
>
>
> If `sanitizer.enable` is turned off, `ListWorkEfforts` form will be vulnerable to XSS attack, because of incomplete escaping.
> Steps to reproduce:
> 1. Turn off `sanitizer.enable` in owasp.properties
> 2. Create a WorkEffort entity with name as `<script>alert(1)</script>`
> 3. Go to page: http://localhost:8080/workeffort/control/FindWorkEffort
> 4. Search for "Work Effort Name" which contains "script"



--
This message was sent by Atlassian Jira
(v8.3.4#803005)