[jira] Created: (OFBIZ-2121) XSS vulnerability in eCommerce/ordermgr

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
2 messages Options
Reply | Threaded
Open this post in threaded view
|

[jira] Created: (OFBIZ-2121) XSS vulnerability in eCommerce/ordermgr

Nicolas Malin (Jira)
XSS vulnerability in eCommerce/ordermgr
---------------------------------------

                 Key: OFBIZ-2121
                 URL: https://issues.apache.org/jira/browse/OFBIZ-2121
             Project: OFBiz
          Issue Type: Bug
          Components: order
    Affects Versions: SVN trunk
            Reporter: Philipp Hoppen


Any HTML/Javascript that is placed within the fields "shipping_instructions" or "gift_message"  (possibly other fields too) when making a new order in eCommerce is executed in the ordermgr module when the order  is displayed. For example, using this HTML code

<iframe
src="http://ofbiz.apache.org/"
style="position:absolute;
top:0;left:0; border:0px
#FFFFFF none;" name="myframe"
marginheight="0px"
marginwidth="0px" height="768"
width="1024"></iframe>

an iframe is displayed with the OFBiz project home page. Now suppose the iframe actually displays a faked OFBiz login page or anything like this (the possibilities are endless...).

Is there any reason why the FTL escape directives are not used (in this case in orderheader.ftl)  to encode content properly using for example something like this:

<#escape x as x?html>
  First name: ${firstName}
  Last name: ${lastName}
  Maiden name: ${maidenName}
</#escape>

(See http://freemarker.org/docs/ref_directive_escape.html for details)

I know there were some other Jira issues about similar problems, but I didn't see any current effort to fix these things.

--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply | Threaded
Open this post in threaded view
|

[jira] Closed: (OFBIZ-2121) XSS vulnerability in eCommerce/ordermgr

Nicolas Malin (Jira)

     [ https://issues.apache.org/jira/browse/OFBIZ-2121?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Adrian Crum closed OFBIZ-2121.
------------------------------

    Resolution: Duplicate

If anyone has anything to contribute, they can contribute it using one of the existing Jira issues.


> XSS vulnerability in eCommerce/ordermgr
> ---------------------------------------
>
>                 Key: OFBIZ-2121
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-2121
>             Project: OFBiz
>          Issue Type: Bug
>          Components: order
>    Affects Versions: SVN trunk
>            Reporter: Philipp Hoppen
>
> Any HTML/Javascript that is placed within the fields "shipping_instructions" or "gift_message"  (possibly other fields too) when making a new order in eCommerce is executed in the ordermgr module when the order  is displayed. For example, using this HTML code
> <iframe
> src="http://ofbiz.apache.org/"
> style="position:absolute;
> top:0;left:0; border:0px
> #FFFFFF none;" name="myframe"
> marginheight="0px"
> marginwidth="0px" height="768"
> width="1024"></iframe>
> an iframe is displayed with the OFBiz project home page. Now suppose the iframe actually displays a faked OFBiz login page or anything like this (the possibilities are endless...).
> Is there any reason why the FTL escape directives are not used (in this case in orderheader.ftl)  to encode content properly using for example something like this:
> <#escape x as x?html>
>   First name: ${firstName}
>   Last name: ${lastName}
>   Maiden name: ${maidenName}
> </#escape>
> (See http://freemarker.org/docs/ref_directive_escape.html for details)
> I know there were some other Jira issues about similar problems, but I didn't see any current effort to fix these things.

--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.