First published: Tue Nov 29 2016(Updated: )
The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OFBiz | =11.04 | |
Apache OFBiz | =11.04.01 | |
Apache OFBiz | =11.04.02 | |
Apache OFBiz | =11.04.03 | |
Apache OFBiz | =11.04.04 | |
Apache OFBiz | =11.04.05 | |
Apache OFBiz | =11.04.06 | |
Apache OFBiz | =12.04 | |
Apache OFBiz | =12.04.01 | |
Apache OFBiz | =12.04.02 | |
Apache OFBiz | =12.04.03 | |
Apache OFBiz | =12.04.04 | |
Apache OFBiz | =12.04.05 | |
Apache OFBiz | =12.04.06 | |
Apache OFBiz | =13.07 | |
Apache OFBiz | =13.07.01 | |
Apache OFBiz | =13.07.02 | |
Apache OFBiz | =13.07.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6800 has been classified as a moderate severity vulnerability due to potential impacts depending on the context of use.
To resolve CVE-2016-6800, update to a patched version of Apache OFBiz that is not vulnerable.
CVE-2016-6800 affects multiple versions of Apache OFBiz including 11.04, 12.04, and 13.07.
CVE-2016-6800 is a user input validation vulnerability that can lead to potential injection attacks.
While the best approach is to apply updates, users may limit exposure by restricting access to the blog functionalities.