[ 
https://issues.apache.org/jira/browse/OFBIZ-2121?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Adrian Crum closed OFBIZ-2121.
------------------------------

    Resolution: Duplicate

If anyone has anything to contribute, they can contribute it using one of the 
existing Jira issues.


> XSS vulnerability in eCommerce/ordermgr
> ---------------------------------------
>
>                 Key: OFBIZ-2121
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-2121
>             Project: OFBiz
>          Issue Type: Bug
>          Components: order
>    Affects Versions: SVN trunk
>            Reporter: Philipp Hoppen
>
> Any HTML/Javascript that is placed within the fields "shipping_instructions" 
> or "gift_message"  (possibly other fields too) when making a new order in 
> eCommerce is executed in the ordermgr module when the order  is displayed. 
> For example, using this HTML code 
> <iframe
> src="http://ofbiz.apache.org/";
> style="position:absolute;
> top:0;left:0; border:0px
> #FFFFFF none;" name="myframe"
> marginheight="0px"
> marginwidth="0px" height="768"
> width="1024"></iframe>
> an iframe is displayed with the OFBiz project home page. Now suppose the 
> iframe actually displays a faked OFBiz login page or anything like this (the 
> possibilities are endless...).
> Is there any reason why the FTL escape directives are not used (in this case 
> in orderheader.ftl)  to encode content properly using for example something 
> like this:
> <#escape x as x?html>
>   First name: ${firstName}
>   Last name: ${lastName}
>   Maiden name: ${maidenName}
> </#escape> 
> (See http://freemarker.org/docs/ref_directive_escape.html for details)
> I know there were some other Jira issues about similar problems, but I didn't 
> see any current effort to fix these things.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to