[ 
http://issues.apache.org/jira/browse/OFBIZ-260?page=comments#action_12436365 ] 
            
Leon Torres commented on OFBIZ-260:
-----------------------------------

The attack would have to be extremely sophisticated and social:  Imagine that 
the popup is inserted into some description field.  When displayed in a text 
area, it gets executed.  (I tried <script>alert("XSS")</script>, it worked.)  
Now imagine that the popup is designed to look like the ofbiz login screen.  An 
administrator would type in the username and password, which then gets sent to 
some remote site via a URL call in javascript.  The window closes and the 
administrator wonders what happened.

So a combination of phishing techniques, careful scripting, a careless user, 
and a compromised account that can edit a textarea is sufficient to cause a 
vulnerability.


> Cross Site Scripting Vulnerability (XSS)
> ----------------------------------------
>
>                 Key: OFBIZ-260
>                 URL: http://issues.apache.org/jira/browse/OFBIZ-260
>             Project: OFBiz (The Open for Business Project)
>          Issue Type: Bug
>          Components: ecommerce
>    Affects Versions: SVN trunk
>            Reporter: Marco Risaliti
>
> It's a copy of http://jira.undersunconsulting.com/browse/OFBIZ-559 from 
> Olivier Lietz.
> ===========================================================
> *Very* simple test: 
> /ecommerce/control/keywordsearch?SEARCH_STRING=<script>alert("XSS");</script> 
> Other components beside ecommerce are also affected.  
>  

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: 
http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to