First published: Fri Sep 02 2022(Updated: )
In Apache OFBiz, versions 18.12.05 and earlier, an attacker acting as an anonymous user of the ecommerce plugin, can insert a malicious content in a message “Subject” field from the "Contact us" page. Then a party manager needs to list the communications in the party component to activate the SSTI. A RCE is then possible.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OFBiz | <18.12.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25813 is a vulnerability in Apache OFBiz versions 18.12.05 and earlier that allows an attacker to insert malicious content in the "Subject" field of a "Contact us" message, leading to server-side template injection (SSTI).
CVE-2022-25813 affects Apache OFBiz versions 18.12.05 and earlier, enabling an attacker to exploit server-side template injection through the ecommerce plugin's "Contact us" feature.
CVE-2022-25813 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2022-25813 by acting as an anonymous user of the ecommerce plugin, inserting malicious content in the "Subject" field of a "Contact us" message to trigger server-side template injection.
Yes, a fix is available for CVE-2022-25813 in Apache OFBiz version 18.12.06, which addresses the vulnerability.